Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-0778
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.765Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "name": "DSA-5103", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5103" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "name": "FEDORA-2022-a5f51502f0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "name": "FEDORA-2022-9e88b5d8d7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "name": "FEDORA-2022-8bb51f6901", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "tags": [ "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2022-06" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2022-07" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2022-08" }, { "name": "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "name": "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "name": "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213257" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213256" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213255" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2022-09" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "name": "GLSA-202210-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "status": "affected", "version": "Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1)" }, { "status": "affected", "version": "Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m)" }, { "status": "affected", "version": "Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc)" } ] } ], "credits": [ { "lang": "en", "value": "Tavis Ormandy (Google)" } ], "datePublic": "2022-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc)." } ], "metrics": [ { "other": { "content": { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#High", "value": "High" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "description": "Infinite loop", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T19:07:01.186352", "orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "shortName": "openssl" }, "references": [ { "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "name": "DSA-5103", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5103" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "name": "FEDORA-2022-a5f51502f0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "name": "FEDORA-2022-9e88b5d8d7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "name": "FEDORA-2022-8bb51f6901", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "url": "https://www.tenable.com/security/tns-2022-06" }, { "url": "https://www.tenable.com/security/tns-2022-07" }, { "url": "https://www.tenable.com/security/tns-2022-08" }, { "name": "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "name": "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "name": "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "url": "https://support.apple.com/kb/HT213257" }, { "url": "https://support.apple.com/kb/HT213256" }, { "url": "https://support.apple.com/kb/HT213255" }, { "url": "https://www.tenable.com/security/tns-2022-09" }, { "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "name": "GLSA-202210-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } }, "cveMetadata": { "assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "assignerShortName": "openssl", "cveId": "CVE-2022-0778", "datePublished": "2022-03-15T17:05:20.382533Z", "dateReserved": "2022-02-28T00:00:00", "dateUpdated": "2024-09-17T00:01:02.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-0778\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2022-03-15T17:15:08.513\",\"lastModified\":\"2024-11-21T06:39:22.540\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n BN_mod_sqrt(), que calcula una ra\u00edz cuadrada modular, contiene un error que puede causar un bucle eterno para m\u00f3dulos no primos. Internamente, esta funci\u00f3n es usado cuando son analizados certificados que contienen claves p\u00fablicas de curva el\u00edptica en forma comprimida o par\u00e1metros de curva el\u00edptica expl\u00edcitos con un punto base codificado en forma comprimida. Es posible desencadenar el bucle infinito si es dise\u00f1ado un certificado con par\u00e1metros de curva expl\u00edcitos no v\u00e1lidos. Dado que el an\u00e1lisis del certificado es realizado antes de la verificaci\u00f3n de la firma del certificado, cualquier proceso que analice un certificado suministrado externamente puede ser objeto de un ataque de denegaci\u00f3n de servicio. El bucle infinito tambi\u00e9n puede alcanzarse cuando son analizadas claves privadas dise\u00f1adas, ya que pueden contener par\u00e1metros expl\u00edcitos de la curva el\u00edptica. Por lo tanto, las situaciones vulnerables incluyen: - Clientes TLS que consumen certificados de servidor - Servidores TLS que consumen certificados de cliente - Proveedores de hosting que toman certificados o claves privadas de clientes - Autoridades de certificaci\u00f3n que analizan peticiones de certificaci\u00f3n de suscriptores - Cualquier otra cosa que analice par\u00e1metros de curva el\u00edptica ASN.1 Tambi\u00e9n cualquier otra aplicaci\u00f3n que utilice BN_mod_sqrt() donde el atacante pueda controlar los valores de los par\u00e1metros es vulnerable a este problema de DoS. En OpenSSL versi\u00f3n 1.0.2, la clave p\u00fablica no es analizada durante el an\u00e1lisis inicial del certificado, lo que dificulta ligeramente la activaci\u00f3n del bucle infinito. Sin embargo, cualquier operaci\u00f3n que requiera la clave p\u00fablica del certificado desencadenar\u00e1 el bucle infinito. En particular, el atacante puede usar un certificado autofirmado para desencadenar el bucle durante la verificaci\u00f3n de la firma del certificado. Este problema afecta a OpenSSL versiones 1.0.2, 1.1.1 y 3.0. Fue abordado en las versiones 1.1.1n y 3.0.2 del 15 de marzo de 2022. Corregido en OpenSSL versi\u00f3n 3.0.2 (Afectado 3.0.0,3.0.1). Corregido en OpenSSL versi\u00f3n 1.1.1n (Afectado 1.1.1-1.1.1m). Corregido en OpenSSL versi\u00f3n 1.0.2zd (Afectado 1.0.2-1.0.2zc)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.2\",\"versionEndExcluding\":\"1.0.2zd\",\"matchCriteriaId\":\"F3BC593C-D7BB-42A8-9488-BE910A8C3B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0\",\"versionEndExcluding\":\"1.1.1n\",\"matchCriteriaId\":\"16D7B14C-9D04-40AC-9FCE-73D3DF468DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.0.2\",\"matchCriteriaId\":\"E7225F27-E0BC-4716-AF68-8D68EE90F7CE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280AA828-6FA9-4260-8EC1-019423B966E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62347994-1353-497C-9C4A-D5D8D95F67E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361B791A-D336-4431-8F68-8135BEFFAEA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ADFF451-740F-4DBA-BD23-3881945D3E40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1236B66D-EB11-4324-929F-E2B86683C3C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"281DFC67-46BB-4FC2-BE03-3C65C9311F65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF32BB1-9A58-4821-AE49-5D5C8200631F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F21DE67F-CDFD-4D36-9967-633CD0240C6F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.15.4\",\"matchCriteriaId\":\"1188273E-D496-41A9-AE16-75C0EB70EFB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.1.2\",\"matchCriteriaId\":\"644DD241-261E-41A3-86B5-C0834502EA81\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.2.0\",\"versionEndExcluding\":\"10.2.42\",\"matchCriteriaId\":\"49CFE4A3-DDFC-4801-8C68-510EB5CFBC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.3.0\",\"versionEndExcluding\":\"10.3.33\",\"matchCriteriaId\":\"F8EB13E9-AFD7-4E82-A471-61201460CAC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.4.0\",\"versionEndExcluding\":\"10.4.23\",\"matchCriteriaId\":\"3EFE42EF-DB07-4DD4-A40C-6DD6A7D1E6DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.5.0\",\"versionEndExcluding\":\"10.5.14\",\"matchCriteriaId\":\"E3C63CE6-6B86-4C48-8D30-DC74CA83C5EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.6.0\",\"versionEndExcluding\":\"10.6.6\",\"matchCriteriaId\":\"09ADA35C-125F-4970-ACB7-36A9CC3516BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.7.0\",\"versionEndExcluding\":\"10.7.2\",\"matchCriteriaId\":\"E0435104-B0F9-4997-A769-36821689DF45\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndIncluding\":\"12.12.0\",\"matchCriteriaId\":\"564ED5C8-50D7-413A-B88E-E62B6C07336A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"12.13.0\",\"versionEndExcluding\":\"12.22.11\",\"matchCriteriaId\":\"274A9803-2997-4E65-BDB0-8B5C23120CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartExcluding\":\"14.0.0\",\"versionEndIncluding\":\"14.14.0\",\"matchCriteriaId\":\"05678B4E-5F27-4096-8E9B-38B84A7E7793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"14.15.0\",\"versionEndExcluding\":\"14.19.1\",\"matchCriteriaId\":\"CECEE1EE-B2A2-476B-82AE-48DFF6F1729A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartExcluding\":\"16.0.0\",\"versionEndIncluding\":\"16.12.0\",\"matchCriteriaId\":\"DC9C8402-7102-4BCF-8A49-CFDF1C59B92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"16.13.0\",\"versionEndExcluding\":\"16.14.2\",\"matchCriteriaId\":\"3DF34038-6987-4196-B5E7-FF5656D1EE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartExcluding\":\"17.0.0\",\"versionEndExcluding\":\"17.7.2\",\"matchCriteriaId\":\"0AD8D8BB-702C-4FDF-A0A2-872744B8BF68\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/33\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/35\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/38\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-02\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220321-0002/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220429-0005/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://support.apple.com/kb/HT213255\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213256\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213257\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5103\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20220315.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-06\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-07\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-08\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-09\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220321-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220429-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/kb/HT213255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20220315.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ICSA-23-143-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to crash the device being accessed or cause a denial-of-service condition. ", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-143-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-143-02.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-23-143-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi Energy\u0027s RTU500 Series Product (UPDATE B)", "tracking": { "current_release_date": "2023-10-19T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-143-02", "initial_release_date": "2023-05-05T06:00:00.000000Z", "revision_history": [ { "date": "2023-05-05T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2023-09-28T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Update A - Update to Mitigations and Affected Products" }, { "date": "2023-10-19T06:00:00.000000Z", "legacy_version": "Update B", "number": "3", "summary": "Update B - Update to Mitigations and Affected Products" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=12.0.1|\u003c=12.0.15", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.0.1|\u003c=12.0.15", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.2.1|\u003c=12.2.12", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.2.1|\u003c=12.2.12", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.4.1|\u003c=12.4.12", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.4.1|\u003c=12.4.12", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.6.1|\u003c=12.6.9", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.6.1|\u003c=12.6.9", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.7.1|\u003c=12.7.6", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.7.1|\u003c=12.7.6", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.2.1|\u003c=13.2.6", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.2.1|\u003c=13.2.6", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.3.1|\u003c=13.3.3", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.3.1|\u003c=13.3.3", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.4.1|\u003c=13.4.2", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.4.1|\u003c=13.4.2", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "There is a type-confusion vulnerability affecting X.400 address processing within an X.509 GeneralName. This vulnerability could allow an attacker to pass arbitrary pointers to a memcmp call, enabling access to read memory contents or cause a denial-of-service condition.X.400 addresses parsed as an ASN1_STRING while the public structure definition for GENERAL_NAME incorrectly specifies the x400Address field type as ASN1_TYPE.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0286" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Until the updates are made available, Hitachi Energy recommends the following general mitigation factors/workarounds for the products with RTU500 series CMU Firmware versions 12.0.1 \ufffd 12.0.15, 12.2.1 \ufffd 12.2.12, 12.4.1 \ufffd 12.4.12, 12.6.1 \ufffd 12.6.9, 12.7.1 \ufffd 12.7.6, 13.2.1 \ufffd 13.2.6, 13.3.1 \ufffd 13.3.3, 13.4.2 to address the vulnerabilities CVE-2023-0286 and CVE-2022-4304:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing-based side channel exists in the OpenSSL RSA Decryption implementation. This could allow an attacker sufficient access to recover plaintext across a network to perform a Bleichenbacher style attack. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Until the updates are made available, Hitachi Energy recommends the following general mitigation factors/workarounds for the products with RTU500 series CMU Firmware versions 12.0.1 - 12.0.15, 12.2.1 - 12.2.12, 12.4.1 - 12.4.12, 12.6.1 - 12.6.9, 12.7.1 - 12.7.6, 13.2.1 - 13.2.6, 13.3.1 - 13.3.3, 13.4.2 to address the vulnerabilities CVE-2023-0286 and CVE-2022-4304:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-23937", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the Wind River VxWorks version 6.9 affecting the RTU500 series product versions listed. An attacker could exploit the vulnerability by using a specific crafted packet that could lead to an out-of-bounds read during an IKE initial exchange scenario. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23937" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 \ufffd 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 \ufffd 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 \ufffd 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 \ufffd 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 \ufffd 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 \ufffd 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 \ufffd 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL version 1.0.2 that affects the RTU500 Series product versions listed. An attacker can exploit the BN_mod_sqrt() function to compute a modular square root that contains a bug causing a continual loop for non-prime moduli. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 \ufffd 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 \ufffd 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 \ufffd 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 \ufffd 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 \ufffd 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 \ufffd 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 \ufffd 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL Version 1.0.2 affecting the RTU500 Series product versions listed. An attacker with access to applications and the capability to present SM2 content for decryption could cause a buffer overflow up to a maximum of 62 bytes while altering contents of data present after the buffer. This vulnerability could allow an attacker to change application behavior or cause the application to crash.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3711" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL Version 1.0.2 affecting the RTU500 Series product versions listed. A malicious actor could cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions. Exploiting this vulnerability could create a system crash causing a denial-of-service condition or a disclosure of private memory contents, such as private keys or sensitive plaintext. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3712" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
icsa-22-272-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause the affected modules in the product to stop working.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability. This vulnerability is exploitable remotely. This vulnerability has a low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-272-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-272-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-272-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-272-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-272-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Hitachi Energy MicroSCADA Pro X SYS600", "tracking": { "current_release_date": "2022-09-29T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-272-02", "initial_release_date": "2022-09-29T00:00:00.000000Z", "revision_history": [ { "date": "2022-09-29T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.x", "product": { "name": "SYS600: 9.x versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 10.3.1", "product": { "name": "SYS600: 10.3.1 and earlier", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SYS600" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "Hitachi Energy is aware of public reports of vulnerabilities in third-party open-source software components (OpenLDAP and OpenSSL) used in MicroSCADA Pro/X SYS600 products.CVE-2020-25692 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25692" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "For SYS600 9.4: upgrade to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "For SYS600 10.x: update to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends following 1MRK511518 MicroSCADA X Cyber Security Deployment Guidelines.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For additional information and support, users should contact Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.hitachienergy.com/contact-us/" }, { "category": "mitigation", "details": "Physically protect process control systems from unauthorized direct access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from the internet and other networks using firewall system with minimal open ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or email.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000107.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000107" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "Hitachi Energy is aware of public reports of vulnerabilities in third-party open-source software components (OpenLDAP and OpenSSL) used in MicroSCADA Pro/X SYS600 products.CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "For SYS600 9.4: upgrade to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "For SYS600 10.x: update to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends following 1MRK511518 MicroSCADA X Cyber Security Deployment Guidelines.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For additional information and support, users should contact Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.hitachienergy.com/contact-us/" }, { "category": "mitigation", "details": "Physically protect process control systems from unauthorized direct access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from the internet and other networks using firewall system with minimal open ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or email.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000107.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000107" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
ICSA-22-132-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Mitsubishi Electric", "summary": "notifying CISA of these vulnerabilities" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in a denial-of-service condition, malicious program execution, information disclosure, information tampering, or authentication bypass.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-132-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-132-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-132-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Mitsubishi Electric MELSOFT iQ AppPortal", "tracking": { "current_release_date": "2022-05-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-132-02", "initial_release_date": "2022-05-12T00:00:00.000000Z", "revision_history": [ { "date": "2022-05-12T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-132-02 Mitsubishi Electric MELSOFT iQ AppPortal" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.00A | \u003c= 1.26C", "product": { "name": "MELSOFT iQ AppPortal (SW1DND-IQAPL-M): Versions 1.00A through 1.26C", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "MELSOFT iQ AppPortal (SW1DND-IQAPL-M)" } ], "category": "vendor", "name": "Mitsubishi Electric" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13938", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "Apache HTTP Server Versions 2.4.0 to 2.4.46 allow unprivileged local users to stop httpd on Windows.CVE-2020-13938 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13938" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-26691", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Apache HTTP Server Versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow.CVE-2021-26691 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26691" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-34798", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server Versions 2.4.48 and earlier.CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34798" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker who can present SM2 content for decryption to an application could cause data to overflow the buffer up to a maximum of 62 bytes, altering the contents of other data held after the buffer or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1 (Affected 1.1.1-1.1.1k). This issue is detailed further in CVE-2021-3711.CVE-2021-3711 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3711" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for this vulnerability, though it might be possible to craft one. This issue affects Apache HTTP Server Versions 2.4.51 and earlier.CVE-2021-44790 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44790" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Apache HTTP Server Versions 2.4.52 and earlier fail to close inbound connections when errors are encountered discarding the request body, exposing the server to HTTP request smuggling.CVE-2022-22720 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22720" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-23943", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 Versions 2.4.52 and earlier.CVE-2022-23943 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23943" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop for non-prime moduli. An attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue, which is further detailed in CVE-2022-0778, affects OpenSSL Versions 1.0.2, 1.1.1, and 3.0.xxxCVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-22-167-14
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could create a denial-of-service condition in the affected products.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-712929.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-14 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-14.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-14 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-14" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-712929.html" }, { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-712929.txt" } ], "title": "Siemens OpenSSL Affected Industrial Products (Update C)", "tracking": { "current_release_date": "2022-06-16T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-167-14", "initial_release_date": "2022-06-16T00:00:00.000000Z", "revision_history": [ { "date": "2022-06-16T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-167-14 Siemens OpenSSL Affected Industrial Products" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.6 Upd6", "product": { "name": " SIMATIC Logon V1.6", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": " SIMATIC Logon V1.6" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.7", "product": { "name": "Industrial Edge - OPC UA Connector", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Industrial Edge - OPC UA Connector" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.7", "product": { "name": "Industrial Edge - SIMATIC S7 Connector App", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Industrial Edge - SIMATIC S7 Connector App" }, { "branches": [ { "category": "product_version_range", "name": "All versions only when running on ROX II \u003c V2.15.1", "product": { "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2BA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)", "product_id": "CSAFPID-0006", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2DA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000RE", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000RE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1400", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1400" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1500", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1500" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1501", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1501" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1510", "product_id": "CSAFPID-00012" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1510" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1511", "product_id": "CSAFPID-00013" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1511" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1512", "product_id": "CSAFPID-00014" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1512" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1524", "product_id": "CSAFPID-00015" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1524" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1536", "product_id": "CSAFPID-00016" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1536" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX5000", "product_id": "CSAFPID-00017" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)", "product_id": "CSAFPID-00018", "product_identification_helper": { "model_numbers": [ "6GK5998-3GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)", "product_id": "CSAFPID-00019", "product_identification_helper": { "model_numbers": [ "6GK5804-0AP00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)", "product_id": "CSAFPID-00020", "product_identification_helper": { "model_numbers": [ "6GK5812-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)", "product_id": "CSAFPID-00021", "product_identification_helper": { "model_numbers": [ "6GK5812-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)", "product_id": "CSAFPID-00022", "product_identification_helper": { "model_numbers": [ "6GK5816-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)", "product_id": "CSAFPID-00023", "product_identification_helper": { "model_numbers": [ "6GK5816-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)", "product_id": "CSAFPID-00024", "product_identification_helper": { "model_numbers": [ "6GK5826-2AB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)", "product_id": "CSAFPID-00025", "product_identification_helper": { "model_numbers": [ "6GK5874-2AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)", "product_id": "CSAFPID-00026", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)", "product_id": "CSAFPID-00027", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)", "product_id": "CSAFPID-00028", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2EA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)", "product_id": "CSAFPID-00029", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA10-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)", "product_id": "CSAFPID-00030", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)", "product_id": "CSAFPID-00031", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2DA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)", "product_id": "CSAFPID-00032", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA00-2DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)", "product_id": "CSAFPID-00033", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)", "product_id": "CSAFPID-00034", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)", "product_id": "CSAFPID-00035", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)", "product_id": "CSAFPID-00036", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA01-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)", "product_id": "CSAFPID-00037", "product_identification_helper": { "model_numbers": [ "6GK5622-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)", "product_id": "CSAFPID-00038", "product_identification_helper": { "model_numbers": [ "6GK5632-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)", "product_id": "CSAFPID-00039", "product_identification_helper": { "model_numbers": [ "6GK5636-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)", "product_id": "CSAFPID-00040", "product_identification_helper": { "model_numbers": [ "6GK5642-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)", "product_id": "CSAFPID-00041", "product_identification_helper": { "model_numbers": [ "6GK5646-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)", "product_id": "CSAFPID-00042", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)", "product_id": "CSAFPID-00043", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)", "product_id": "CSAFPID-00044", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AD0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)", "product_id": "CSAFPID-00045", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)", "product_id": "CSAFPID-00046", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)", "product_id": "CSAFPID-00047", "product_identification_helper": { "model_numbers": [ "6GK5788-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)", "product_id": "CSAFPID-00048", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)", "product_id": "CSAFPID-00049", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)", "product_id": "CSAFPID-00050", "product_identification_helper": { "model_numbers": [ "6GK5788-2HY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)", "product_id": "CSAFPID-00051", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)", "product_id": "CSAFPID-00052", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)", "product_id": "CSAFPID-00053", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)", "product_id": "CSAFPID-00054", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)", "product_id": "CSAFPID-00055", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)", "product_id": "CSAFPID-00056", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)", "product_id": "CSAFPID-00057", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)", "product_id": "CSAFPID-00058", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)", "product_id": "CSAFPID-00059", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)", "product_id": "CSAFPID-00060", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)", "product_id": "CSAFPID-00061", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)", "product_id": "CSAFPID-00062", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)", "product_id": "CSAFPID-00063", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)", "product_id": "CSAFPID-00064", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)", "product_id": "CSAFPID-00065", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)", "product_id": "CSAFPID-00066", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)", "product_id": "CSAFPID-00067", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)", "product_id": "CSAFPID-00068", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)", "product_id": "CSAFPID-00069", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)", "product_id": "CSAFPID-00070", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)", "product_id": "CSAFPID-00071", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)", "product_id": "CSAFPID-00072", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)", "product_id": "CSAFPID-00073", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)", "product_id": "CSAFPID-00074", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)", "product_id": "CSAFPID-00075", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)", "product_id": "CSAFPID-00076", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)", "product_id": "CSAFPID-00077", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)", "product_id": "CSAFPID-00078", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)", "product_id": "CSAFPID-00079", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)", "product_id": "CSAFPID-00080", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)", "product_id": "CSAFPID-00081", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)", "product_id": "CSAFPID-00082", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)", "product_id": "CSAFPID-00083", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)", "product_id": "CSAFPID-00084", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)", "product_id": "CSAFPID-00085", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)", "product_id": "CSAFPID-00086", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)", "product_id": "CSAFPID-00087", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)", "product_id": "CSAFPID-00088", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)", "product_id": "CSAFPID-00089", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)", "product_id": "CSAFPID-00090", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)", "product_id": "CSAFPID-00091", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)", "product_id": "CSAFPID-00092", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)", "product_id": "CSAFPID-00093", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)", "product_id": "CSAFPID-00094", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)", "product_id": "CSAFPID-00095", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)", "product_id": "CSAFPID-00096", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)", "product_id": "CSAFPID-00097", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)", "product_id": "CSAFPID-00098", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)", "product_id": "CSAFPID-00099", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)", "product_id": "CSAFPID-000100", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)", "product_id": "CSAFPID-000101", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)", "product_id": "CSAFPID-000102", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)", "product_id": "CSAFPID-000103", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)", "product_id": "CSAFPID-000104", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)", "product_id": "CSAFPID-000105", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)", "product_id": "CSAFPID-000106", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)", "product_id": "CSAFPID-000107", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)", "product_id": "CSAFPID-000108", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)", "product_id": "CSAFPID-000109", "product_identification_helper": { "model_numbers": [ "6GK5200-4AH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)", "product_id": "CSAFPID-000110", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)", "product_id": "CSAFPID-000111", "product_identification_helper": { "model_numbers": [ "6GK5201-3JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)", "product_id": "CSAFPID-000112", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)", "product_id": "CSAFPID-000113", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)", "product_id": "CSAFPID-000114", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)", "product_id": "CSAFPID-000115", "product_identification_helper": { "model_numbers": [ "6GK5202-2JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)", "product_id": "CSAFPID-000116", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)", "product_id": "CSAFPID-000117", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB11-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)", "product_id": "CSAFPID-000118", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)", "product_id": "CSAFPID-000119", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)", "product_id": "CSAFPID-000120", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)", "product_id": "CSAFPID-000121", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)", "product_id": "CSAFPID-000122", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)", "product_id": "CSAFPID-000123", "product_identification_helper": { "model_numbers": [ "6GK5204-0JA00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)", "product_id": "CSAFPID-000124", "product_identification_helper": { "model_numbers": [ "6GK5206-1BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)", "product_id": "CSAFPID-000125", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)", "product_id": "CSAFPID-000126", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)", "product_id": "CSAFPID-000127", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA10-2AA6" ] } } } ], "category": "product_name", "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)", "product_id": "CSAFPID-000128", "product_identification_helper": { "model_numbers": [ "6GK5212-2BB00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)", "product_id": "CSAFPID-000129", "product_identification_helper": { "model_numbers": [ "6GK5212-2BC00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)", "product_id": "CSAFPID-000130", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)", "product_id": "CSAFPID-000131", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)", "product_id": "CSAFPID-000132", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)", "product_id": "CSAFPID-000133", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)", "product_id": "CSAFPID-000134", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)", "product_id": "CSAFPID-000135", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)", "product_id": "CSAFPID-000136", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)", "product_id": "CSAFPID-000137", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)", "product_id": "CSAFPID-000138", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)", "product_id": "CSAFPID-000139", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)", "product_id": "CSAFPID-000140", "product_identification_helper": { "model_numbers": [ "6GK5304-2BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)", "product_id": "CSAFPID-000141", "product_identification_helper": { "model_numbers": [ "6GK5306-1BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)", "product_id": "CSAFPID-000142", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)", "product_id": "CSAFPID-000143", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)", "product_id": "CSAFPID-000144", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)", "product_id": "CSAFPID-000145", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)", "product_id": "CSAFPID-000146", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)", "product_id": "CSAFPID-000147", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)", "product_id": "CSAFPID-000148", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)", "product_id": "CSAFPID-000149", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)", "product_id": "CSAFPID-000150", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)", "product_id": "CSAFPID-000151", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)", "product_id": "CSAFPID-000152", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)", "product_id": "CSAFPID-000153", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)", "product_id": "CSAFPID-000154", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)", "product_id": "CSAFPID-000155", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)", "product_id": "CSAFPID-000156", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)", "product_id": "CSAFPID-000157", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)", "product_id": "CSAFPID-000158", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)", "product_id": "CSAFPID-000159", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)", "product_id": "CSAFPID-000160", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)", "product_id": "CSAFPID-000161", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)", "product_id": "CSAFPID-000162", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)", "product_id": "CSAFPID-000163", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)", "product_id": "CSAFPID-000164", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)", "product_id": "CSAFPID-000165", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)", "product_id": "CSAFPID-000166", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)", "product_id": "CSAFPID-000167", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)", "product_id": "CSAFPID-000168", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)", "product_id": "CSAFPID-000169", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)", "product_id": "CSAFPID-000170", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)", "product_id": "CSAFPID-000171", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)", "product_id": "CSAFPID-000172", "product_identification_helper": { "model_numbers": [ "6GK5320-1BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)", "product_id": "CSAFPID-000173", "product_identification_helper": { "model_numbers": [ "6GK5320-3BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)", "product_id": "CSAFPID-000174", "product_identification_helper": { "model_numbers": [ "6GK5408-2FD00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)", "product_id": "CSAFPID-000175", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)", "product_id": "CSAFPID-000176", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)", "product_id": "CSAFPID-000177", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)", "product_id": "CSAFPID-000178", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)", "product_id": "CSAFPID-000179", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)", "product_id": "CSAFPID-000180", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)", "product_id": "CSAFPID-000181", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)", "product_id": "CSAFPID-000182", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)", "product_id": "CSAFPID-000183", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)", "product_id": "CSAFPID-000184", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)", "product_id": "CSAFPID-000185", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)", "product_id": "CSAFPID-000186", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)", "product_id": "CSAFPID-000187", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)", "product_id": "CSAFPID-000188", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)", "product_id": "CSAFPID-000189", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)", "product_id": "CSAFPID-000190", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)", "product_id": "CSAFPID-000191", "product_identification_helper": { "model_numbers": [ "6GK5206-2BD00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)", "product_id": "CSAFPID-000192", "product_identification_helper": { "model_numbers": [ "6GK5206-2BB00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)", "product_id": "CSAFPID-000193", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)", "product_id": "CSAFPID-000194", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)", "product_id": "CSAFPID-000195", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)", "product_id": "CSAFPID-000196", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)", "product_id": "CSAFPID-000197", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)", "product_id": "CSAFPID-000198", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)", "product_id": "CSAFPID-000199", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)", "product_id": "CSAFPID-000200", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)", "product_id": "CSAFPID-000201", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)", "product_id": "CSAFPID-000202", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)", "product_id": "CSAFPID-000203", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)", "product_id": "CSAFPID-000204", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)", "product_id": "CSAFPID-000205", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)", "product_id": "CSAFPID-000206", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)", "product_id": "CSAFPID-000207", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)", "product_id": "CSAFPID-000208", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)", "product_id": "CSAFPID-000209", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)", "product_id": "CSAFPID-000210", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)", "product_id": "CSAFPID-000211", "product_identification_helper": { "model_numbers": [ "6GK5216-4BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)", "product_id": "CSAFPID-000212", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)", "product_id": "CSAFPID-000213", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)", "product_id": "CSAFPID-000214", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)", "product_id": "CSAFPID-000215", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)", "product_id": "CSAFPID-000216", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)", "product_id": "CSAFPID-000217", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)", "product_id": "CSAFPID-000218", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)", "product_id": "CSAFPID-000219", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)", "product_id": "CSAFPID-000220", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)", "product_id": "CSAFPID-000221", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)", "product_id": "CSAFPID-000222", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)", "product_id": "CSAFPID-000223", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)", "product_id": "CSAFPID-000224", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)", "product_id": "CSAFPID-000225", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)", "product_id": "CSAFPID-000226", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)", "product_id": "CSAFPID-000227", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)", "product_id": "CSAFPID-000228", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)", "product_id": "CSAFPID-000229", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)", "product_id": "CSAFPID-000230", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)", "product_id": "CSAFPID-000231", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)", "product_id": "CSAFPID-000232", "product_identification_helper": { "model_numbers": [ "6GK5408-4GP00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)", "product_id": "CSAFPID-000233", "product_identification_helper": { "model_numbers": [ "6GK5408-4GQ00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)", "product_id": "CSAFPID-000234", "product_identification_helper": { "model_numbers": [ "6GK5408-8GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)", "product_id": "CSAFPID-000235", "product_identification_helper": { "model_numbers": [ "6GK5408-8GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)", "product_id": "CSAFPID-000236", "product_identification_helper": { "model_numbers": [ "6GK5416-4GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)", "product_id": "CSAFPID-000237", "product_identification_helper": { "model_numbers": [ "6GK5416-4GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)", "product_id": "CSAFPID-000238", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)", "product_id": "CSAFPID-000239", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)", "product_id": "CSAFPID-000240", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)", "product_id": "CSAFPID-000241", "product_identification_helper": { "model_numbers": [ "6GK5208-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)", "product_id": "CSAFPID-000242", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)", "product_id": "CSAFPID-000243", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)", "product_id": "CSAFPID-000244", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)", "product_id": "CSAFPID-000245", "product_identification_helper": { "model_numbers": [ "6GK5216-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)", "product_id": "CSAFPID-000246", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)", "product_id": "CSAFPID-000247", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)", "product_id": "CSAFPID-000248", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)", "product_id": "CSAFPID-000249", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)", "product_id": "CSAFPID-000250", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)", "product_id": "CSAFPID-000251", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)", "product_id": "CSAFPID-000252", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)", "product_id": "CSAFPID-000253", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)", "product_id": "CSAFPID-000254", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)", "product_id": "CSAFPID-000255", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)", "product_id": "CSAFPID-000256", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)", "product_id": "CSAFPID-000257", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)", "product_id": "CSAFPID-000258", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)", "product_id": "CSAFPID-000259", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)", "product_id": "CSAFPID-000260", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)", "product_id": "CSAFPID-000261", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)", "product_id": "CSAFPID-000262", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)", "product_id": "CSAFPID-000263", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)", "product_id": "CSAFPID-000264", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)", "product_id": "CSAFPID-000265", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)", "product_id": "CSAFPID-000266", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)", "product_id": "CSAFPID-000267", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)", "product_id": "CSAFPID-000268", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)", "product_id": "CSAFPID-000269", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)", "product_id": "CSAFPID-000270", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)", "product_id": "CSAFPID-000271", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)", "product_id": "CSAFPID-000272", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)", "product_id": "CSAFPID-000273", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)", "product_id": "CSAFPID-000274", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)", "product_id": "CSAFPID-000275", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)", "product_id": "CSAFPID-000276", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)", "product_id": "CSAFPID-000277", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)", "product_id": "CSAFPID-000278", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)", "product_id": "CSAFPID-000279", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)", "product_id": "CSAFPID-000280", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)", "product_id": "CSAFPID-000281", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)", "product_id": "CSAFPID-000282", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)", "product_id": "CSAFPID-000283", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)", "product_id": "CSAFPID-000284", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)", "product_id": "CSAFPID-000285", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)", "product_id": "CSAFPID-000286", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)", "product_id": "CSAFPID-000287", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)", "product_id": "CSAFPID-000288", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)", "product_id": "CSAFPID-000289", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)", "product_id": "CSAFPID-000290", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)", "product_id": "CSAFPID-000291", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)", "product_id": "CSAFPID-000292", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)", "product_id": "CSAFPID-000293", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)", "product_id": "CSAFPID-000294", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)", "product_id": "CSAFPID-000295", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)", "product_id": "CSAFPID-000296", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)", "product_id": "CSAFPID-000297", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)", "product_id": "CSAFPID-000298", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)", "product_id": "CSAFPID-000299", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)", "product_id": "CSAFPID-000300", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)", "product_id": "CSAFPID-000301", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)", "product_id": "CSAFPID-000302", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)", "product_id": "CSAFPID-000303", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)", "product_id": "CSAFPID-000304", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)", "product_id": "CSAFPID-000305", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)", "product_id": "CSAFPID-000306", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Security Configuration Tool (SCT)", "product_id": "CSAFPID-000307" } } ], "category": "product_name", "name": "Security Configuration Tool (SCT)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)", "product_id": "CSAFPID-000308", "product_identification_helper": { "model_numbers": [ "6GK1411-1AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)", "product_id": "CSAFPID-000309", "product_identification_helper": { "model_numbers": [ "6GK1411-5AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)", "product_id": "CSAFPID-000310", "product_identification_helper": { "model_numbers": [ "6GK7242-7KX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)", "product_id": "CSAFPID-000311", "product_identification_helper": { "model_numbers": [ "6GK7243-1BX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)", "product_id": "CSAFPID-000312", "product_identification_helper": { "model_numbers": [ "6GK7243-7KX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)", "product_id": "CSAFPID-000313", "product_identification_helper": { "model_numbers": [ "6GK7243-7SX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)", "product_id": "CSAFPID-000314", "product_identification_helper": { "model_numbers": [ "6GK7243-8RX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "CSAFPID-000315", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)", "product_id": "CSAFPID-000316", "product_identification_helper": { "model_numbers": [ "6GK7543-1AX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "CSAFPID-000317", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)", "product_id": "CSAFPID-000318", "product_identification_helper": { "model_numbers": [ "6GK7545-1GX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1626 (6GK1162-6AA01)", "product_id": "CSAFPID-000319", "product_identification_helper": { "model_numbers": [ "6GK1162-6AA01" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1626 (6GK1162-6AA01)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1628 (6GK1162-8AA00)", "product_id": "CSAFPID-000320", "product_identification_helper": { "model_numbers": [ "6GK1162-8AA00" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1628 (6GK1162-8AA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)", "product_id": "CSAFPID-000321", "product_identification_helper": { "model_numbers": [ "6GK7343-1GX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)", "product_id": "CSAFPID-000322", "product_identification_helper": { "model_numbers": [ "6GK7443-1GX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "CSAFPID-000323", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.0.1", "product": { "name": "SIMATIC Drive Controller family", "product_id": "CSAFPID-000324" } } ], "category": "product_name", "name": "SIMATIC Drive Controller family" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC ET 200SP Open Controller (incl. SIPLUS variants)", "product_id": "CSAFPID-000325" } } ], "category": "product_name", "name": "SIMATIC ET 200SP Open Controller (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV18", "product": { "name": "SIMATIC HMI Unified Comfort Panels", "product_id": "CSAFPID-000326" } } ], "category": "product_name", "name": "SIMATIC HMI Unified Comfort Panels" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV540 H (6GF3540-0GE10)", "product_id": "CSAFPID-000327", "product_identification_helper": { "model_numbers": [ "6GF3540-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 H (6GF3540-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV540 S (6GF3540-0CD10)", "product_id": "CSAFPID-000328", "product_identification_helper": { "model_numbers": [ "6GF3540-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 S (6GF3540-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV550 H (6GF3550-0GE10)", "product_id": "CSAFPID-000329", "product_identification_helper": { "model_numbers": [ "6GF3550-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 H (6GF3550-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV550 S (6GF3550-0CD10)", "product_id": "CSAFPID-000330", "product_identification_helper": { "model_numbers": [ "6GF3550-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 S (6GF3550-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV560 U (6GF3560-0LE10)", "product_id": "CSAFPID-000331", "product_identification_helper": { "model_numbers": [ "6GF3560-0LE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 U (6GF3560-0LE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV560 X (6GF3560-0HE10)", "product_id": "CSAFPID-000332", "product_identification_helper": { "model_numbers": [ "6GF3560-0HE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 X (6GF3560-0HE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V14", "product_id": "CSAFPID-000333" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V14" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V15", "product_id": "CSAFPID-000334" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V15" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V16 Update 6", "product": { "name": "SIMATIC NET PC Software V16", "product_id": "CSAFPID-000335" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V16" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V17", "product_id": "CSAFPID-000336" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V17" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC PCS 7 TeleControl", "product_id": "CSAFPID-000337" } } ], "category": "product_name", "name": "SIMATIC PCS 7 TeleControl" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0", "product": { "name": "SIMATIC PCS neo (Administration Console)", "product_id": "CSAFPID-000338" } } ], "category": "product_name", "name": "SIMATIC PCS neo (Administration Console)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV9.2.2", "product": { "name": "SIMATIC PDM", "product_id": "CSAFPID-000339" } } ], "category": "product_name", "name": "SIMATIC PDM" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2020 SP1 Update 1", "product": { "name": "SIMATIC Process Historian OPC UA Server", "product_id": "CSAFPID-000340" } } ], "category": "product_name", "name": "SIMATIC Process Historian OPC UA Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF166C (6GT2002-0EE20)", "product_id": "CSAFPID-000341", "product_identification_helper": { "model_numbers": [ "6GT2002-0EE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF166C (6GT2002-0EE20)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF185C (6GT2002-0JE10)", "product_id": "CSAFPID-000342", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE10" ] } } } ], "category": "product_name", "name": "SIMATIC RF185C (6GT2002-0JE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF186C (6GT2002-0JE20)", "product_id": "CSAFPID-000343", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF186C (6GT2002-0JE20)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF186CI (6GT2002-0JE50)", "product_id": "CSAFPID-000344", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE50" ] } } } ], "category": "product_name", "name": "SIMATIC RF186CI (6GT2002-0JE50)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF188C (6GT2002-0JE40)", "product_id": "CSAFPID-000345", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE40" ] } } } ], "category": "product_name", "name": "SIMATIC RF188C (6GT2002-0JE40)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF188CI (6GT2002-0JE60)", "product_id": "CSAFPID-000346", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE60" ] } } } ], "category": "product_name", "name": "SIMATIC RF188CI (6GT2002-0JE60)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF360R (6GT2801-5BA30)", "product_id": "CSAFPID-000347", "product_identification_helper": { "model_numbers": [ "6GT2801-5BA30" ] } } } ], "category": "product_name", "name": "SIMATIC RF360R (6GT2801-5BA30)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF610R (6GT2811-6BC10)", "product_id": "CSAFPID-000348", "product_identification_helper": { "model_numbers": [ "6GT2811-6BC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF610R (6GT2811-6BC10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF615R (6GT2811-6CC10)", "product_id": "CSAFPID-000349", "product_identification_helper": { "model_numbers": [ "6GT2811-6CC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF615R (6GT2811-6CC10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF650R (6GT2811-6AB20)", "product_id": "CSAFPID-000350", "product_identification_helper": { "model_numbers": [ "6GT2811-6AB20" ] } } } ], "category": "product_name", "name": "SIMATIC RF650R (6GT2811-6AB20)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF680R (6GT2811-6AA10)", "product_id": "CSAFPID-000351", "product_identification_helper": { "model_numbers": [ "6GT2811-6AA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF680R (6GT2811-6AA10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF685R (6GT2811-6CA10)", "product_id": "CSAFPID-000352", "product_identification_helper": { "model_numbers": [ "6GT2811-6CA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF685R (6GT2811-6CA10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.6.0", "product": { "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "product_id": "CSAFPID-000353" } } ], "category": "product_name", "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", "product_id": "CSAFPID-000354" } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV30.0", "product": { "name": "SIMATIC S7-1500 Software Controller", "product_id": "CSAFPID-000355" } } ], "category": "product_name", "name": "SIMATIC S7-1500 Software Controller" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.0", "product": { "name": "SIMATIC S7-PLCSIM Advanced", "product_id": "CSAFPID-000356" } } ], "category": "product_name", "name": "SIMATIC S7-PLCSIM Advanced" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC STEP 7 (TIA Portal)", "product_id": "CSAFPID-000357" } } ], "category": "product_name", "name": "SIMATIC STEP 7 (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.7 HF4", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "CSAFPID-000358" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.0", "product": { "name": "SIMATIC WinCC", "product_id": "CSAFPID-000359" } } ], "category": "product_name", "name": "SIMATIC WinCC" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 Update 5", "product": { "name": "SIMATIC WinCC Unified (TIA Portal)", "product_id": "CSAFPID-000360" } } ], "category": "product_name", "name": "SIMATIC WinCC Unified (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT Software ST7sc", "product_id": "CSAFPID-000361" } } ], "category": "product_name", "name": "SINAUT Software ST7sc" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT ST7CC", "product_id": "CSAFPID-000362" } } ], "category": "product_name", "name": "SINAUT ST7CC" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP2", "product": { "name": "SINEC INS", "product_id": "CSAFPID-000363" } } ], "category": "product_name", "name": "SINEC INS" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.0.3", "product": { "name": "SINEC NMS", "product_id": "CSAFPID-000364" } } ], "category": "product_name", "name": "SINEC NMS" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.1", "product": { "name": "SINEMA Remote Connect Server", "product_id": "CSAFPID-000365" } } ], "category": "product_name", "name": "SINEMA Remote Connect Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "CSAFPID-000366", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "CSAFPID-000367", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)", "product_id": "CSAFPID-000368", "product_identification_helper": { "model_numbers": [ "6AG1242-7KX31-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)", "product_id": "CSAFPID-000369", "product_identification_helper": { "model_numbers": [ "6AG1543-1AX00-2XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)", "product_id": "CSAFPID-000370", "product_identification_helper": { "model_numbers": [ "6AG1343-1GX31-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)", "product_id": "CSAFPID-000371", "product_identification_helper": { "model_numbers": [ "6AG1443-1GX30-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)", "product_id": "CSAFPID-000372", "product_identification_helper": { "model_numbers": [ "6AG1202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)", "product_id": "CSAFPID-000373", "product_identification_helper": { "model_numbers": [ "6AG1308-2FL10-4AA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)", "product_id": "CSAFPID-000374", "product_identification_helper": { "model_numbers": [ "6AG1206-2BB00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)", "product_id": "CSAFPID-000375", "product_identification_helper": { "model_numbers": [ "6AG1206-2BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)", "product_id": "CSAFPID-000376", "product_identification_helper": { "model_numbers": [ "6AG1208-0BA00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)", "product_id": "CSAFPID-000377", "product_identification_helper": { "model_numbers": [ "6AG1216-4BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)", "product_id": "CSAFPID-000378", "product_identification_helper": { "model_numbers": [ "6AG1243-1BX30-2AX0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)", "product_id": "CSAFPID-000379", "product_identification_helper": { "model_numbers": [ "6AG2243-1BX30-1XE0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.6", "product": { "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)", "product_id": "CSAFPID-000380", "product_identification_helper": { "model_numbers": [ "6AG1543-1MX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.1.1", "product": { "name": "TeleControl Server Basic V3", "product_id": "CSAFPID-000381" } } ], "category": "product_name", "name": "TeleControl Server Basic V3" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP8", "product": { "name": "TIA Administrator", "product_id": "CSAFPID-000382" } } ], "category": "product_name", "name": "TIA Administrator" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.6", "product": { "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)", "product_id": "CSAFPID-000383", "product_identification_helper": { "model_numbers": [ "6GK7543-1MX00-0XE0" ] } } } ], "category": "product_name", "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V15", "product_id": "CSAFPID-000384" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V15" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V16", "product_id": "CSAFPID-000385" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V16" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV17 Update 5", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V17", "product_id": "CSAFPID-000386" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V17" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. (https://www.openssl.org/news/secadv/20220315.txt). CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108", "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000222", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000225", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306", "CSAFPID-000307", "CSAFPID-000308", "CSAFPID-000309", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000315", "CSAFPID-000316", "CSAFPID-000317", "CSAFPID-000318", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000322", "CSAFPID-000323", "CSAFPID-000324", "CSAFPID-000325", "CSAFPID-000326", "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000335", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000338", "CSAFPID-000339", "CSAFPID-000340", "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346", "CSAFPID-000347", "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352", "CSAFPID-000353", "CSAFPID-000354", "CSAFPID-000355", "CSAFPID-000356", "CSAFPID-000357", "CSAFPID-000358", "CSAFPID-000359", "CSAFPID-000360", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000363", "CSAFPID-000364", "CSAFPID-000365", "CSAFPID-000366", "CSAFPID-000367", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000370", "CSAFPID-000371", "CSAFPID-000372", "CSAFPID-000373", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377", "CSAFPID-000378", "CSAFPID-000379", "CSAFPID-000380", "CSAFPID-000381", "CSAFPID-000382", "CSAFPID-000383", "CSAFPID-000384", "CSAFPID-000385", "CSAFPID-000386" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000222", "CSAFPID-000225", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000307", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000323", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000370", "CSAFPID-000373", "CSAFPID-000384", "CSAFPID-000385" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000316", "CSAFPID-000318", "CSAFPID-000325", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000357", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000378", "CSAFPID-000379" ] }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "CSAFPID-000386" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109784441/" }, { "category": "vendor_fix", "details": "Update to V2.2.28 or later version", "product_ids": [ "CSAFPID-000315", "CSAFPID-000317", "CSAFPID-000366", "CSAFPID-000367" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817067/" }, { "category": "vendor_fix", "details": "Update to V2.3.6 or later version", "product_ids": [ "CSAFPID-000380", "CSAFPID-000383" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817397/" }, { "category": "vendor_fix", "details": "Update to V3.1.1 or later version", "product_ids": [ "CSAFPID-000381" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812231/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "CSAFPID-000322", "CSAFPID-000371" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/" }, { "category": "vendor_fix", "details": "Update to V30.0 or later version", "product_ids": [ "CSAFPID-000355" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478528/" }, { "category": "vendor_fix", "details": "Update to V4.4 or later version", "product_ids": [ "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817768/" }, { "category": "vendor_fix", "details": "Update to V5.5.2 or later version", "product_ids": [ "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000372" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817790/" }, { "category": "vendor_fix", "details": "Update to V7.2 or later version", "product_ids": [ "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817007/" }, { "category": "vendor_fix", "details": "Update to V8.0 or later version", "product_ids": [ "CSAFPID-000359" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109816599/" }, { "category": "vendor_fix", "details": "Update to V1.0.3 or later version", "product_ids": [ "CSAFPID-000364" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/" }, { "category": "vendor_fix", "details": "Update to V2.15.1 or later version", "product_ids": [ "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Use the Edge Management System to update to V1.7 or later version", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.siemens.com/industrial-edge-marketplace/" }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-00018" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "CSAFPID-000365" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811169/" }, { "category": "vendor_fix", "details": "Update to V1.6 Upd6 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109805072/" }, { "category": "vendor_fix", "details": "Update to V9.2.2 or later version", "product_ids": [ "CSAFPID-000339" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811911/" }, { "category": "vendor_fix", "details": "Update to V4.0 or later version", "product_ids": [ "CSAFPID-000338" ], "url": "https://support.industry.siemens.com/cs/ww/de/view/109814551/" }, { "category": "vendor_fix", "details": "Update to V1.9 or later version", "product_ids": [ "CSAFPID-000308", "CSAFPID-000309" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812235/" }, { "category": "vendor_fix", "details": "Update ROX II to V2.15.1 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Update to V3.0.1 or later version", "product_ids": [ "CSAFPID-000354" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version", "product_ids": [ "CSAFPID-000356" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809300/" }, { "category": "vendor_fix", "details": "Update to V4.6.0 or later version", "product_ids": [ "CSAFPID-000353" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814248/" }, { "category": "vendor_fix", "details": "Update to V2.3.1 or later version", "product_ids": [ "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810992/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811878/" }, { "category": "vendor_fix", "details": "Update to V4.0.1 or later version", "product_ids": [ "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811014/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "CSAFPID-000347" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811118/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811120/" }, { "category": "vendor_fix", "details": "Update ot V1.0 SP2 or later version", "product_ids": [ "CSAFPID-000363" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812610/" }, { "category": "vendor_fix", "details": "Update to V1.0 SP8 or later version", "product_ids": [ "CSAFPID-000382" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/114358/" }, { "category": "vendor_fix", "details": "Update to V5.7 HF4 or later version", "product_ids": [ "CSAFPID-000358" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811212/" }, { "category": "vendor_fix", "details": "Update to V16 Update 6 or later version", "product_ids": [ "CSAFPID-000335" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811815/" }, { "category": "vendor_fix", "details": "Update to V6.5 or later version", "product_ids": [ "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809635/" }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "CSAFPID-000360" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109792171/" }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/" }, { "category": "vendor_fix", "details": "Update to V2020 SP1 Update 1 or later version\nIn the context of SIMATIC PCS neo, update to SIMATIC PCS neo V4.0 or later version (\u003chttps://support.industry.siemens.com/cs/ww/de/view/109814551/\u003e); in the context of SIMATIC PCS 7, update to SIMATIC PCS 7 V9.1 SP2 or later version (\u003chttps://support.industry.siemens.com/cs/ww/en/view/109812240/\u003e); in the context of SIMATIC WinCC, contact local support", "product_ids": [ "CSAFPID-000340" ] }, { "category": "vendor_fix", "details": "Update to V3.0.1 or later version", "product_ids": [ "CSAFPID-000324" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109773914/" }, { "category": "vendor_fix", "details": "Update to V18 or later version", "product_ids": [ "CSAFPID-000326" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109746530/" }, { "category": "vendor_fix", "details": "Update to V8.7.1.11 or later version", "product_ids": [ "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109816886/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108", "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000222", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000225", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306", "CSAFPID-000307", "CSAFPID-000308", "CSAFPID-000309", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000315", "CSAFPID-000316", "CSAFPID-000317", "CSAFPID-000318", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000322", "CSAFPID-000323", "CSAFPID-000324", "CSAFPID-000325", "CSAFPID-000326", "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000335", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000338", "CSAFPID-000339", "CSAFPID-000340", "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346", "CSAFPID-000347", "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352", "CSAFPID-000353", "CSAFPID-000354", "CSAFPID-000355", "CSAFPID-000356", "CSAFPID-000357", "CSAFPID-000358", "CSAFPID-000359", "CSAFPID-000360", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000363", "CSAFPID-000364", "CSAFPID-000365", "CSAFPID-000366", "CSAFPID-000367", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000370", "CSAFPID-000371", "CSAFPID-000372", "CSAFPID-000373", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377", "CSAFPID-000378", "CSAFPID-000379", "CSAFPID-000380", "CSAFPID-000381", "CSAFPID-000382", "CSAFPID-000383", "CSAFPID-000384", "CSAFPID-000385", "CSAFPID-000386" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108", "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000222", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000225", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306", "CSAFPID-000307", "CSAFPID-000308", "CSAFPID-000309", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000315", "CSAFPID-000316", "CSAFPID-000317", "CSAFPID-000318", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000322", "CSAFPID-000323", "CSAFPID-000324", "CSAFPID-000325", "CSAFPID-000326", "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000335", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000338", "CSAFPID-000339", "CSAFPID-000340", "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346", "CSAFPID-000347", "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352", "CSAFPID-000353", "CSAFPID-000354", "CSAFPID-000355", "CSAFPID-000356", "CSAFPID-000357", "CSAFPID-000358", "CSAFPID-000359", "CSAFPID-000360", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000363", "CSAFPID-000364", "CSAFPID-000365", "CSAFPID-000366", "CSAFPID-000367", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000370", "CSAFPID-000371", "CSAFPID-000372", "CSAFPID-000373", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377", "CSAFPID-000378", "CSAFPID-000379", "CSAFPID-000380", "CSAFPID-000381", "CSAFPID-000382", "CSAFPID-000383", "CSAFPID-000384", "CSAFPID-000385", "CSAFPID-000386" ] } ], "title": "CVE-2022-0778" } ] }
icsa-24-046-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIDIS Prime before V4.0.400 is affected by multiple vulnerabilities in the components OPC UA and OpenSSL, that could allow an unauthenticated attacker with access to the network where SIDIS Prime is installed to reuse OPC UA client credentials, create a denial of service condition of the SIDIS Prime OPC UA client, or create a denial of service condition of the SIDIS Prime TLS service.\n\nSiemens has released a new version of SIDIS Prime and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-108696.json" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-108696.html" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-108696.pdf" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-108696.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-24-046-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-046-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-046-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIDIS Prime", "tracking": { "current_release_date": "2024-02-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1" } }, "id": "ICSA-24-046-02", "initial_release_date": "2024-02-13T00:00:00.000000Z", "revision_history": [ { "date": "2024-02-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.400", "product": { "name": "SIDIS Prime", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIDIS Prime" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19135", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "CVE-2019-19135: Enable encrypted communication between the affected product (OPC UA client) and the OPC UA server(s)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19135" }, { "cve": "CVE-2020-1967", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-29862", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-29862" } ] }
icsa-22-132-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Mitsubishi Electric", "summary": "notifying CISA of these vulnerabilities" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in a denial-of-service condition, malicious program execution, information disclosure, information tampering, or authentication bypass.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-132-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-132-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-132-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Mitsubishi Electric MELSOFT iQ AppPortal", "tracking": { "current_release_date": "2022-05-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-132-02", "initial_release_date": "2022-05-12T00:00:00.000000Z", "revision_history": [ { "date": "2022-05-12T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-132-02 Mitsubishi Electric MELSOFT iQ AppPortal" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.00A | \u003c= 1.26C", "product": { "name": "MELSOFT iQ AppPortal (SW1DND-IQAPL-M): Versions 1.00A through 1.26C", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "MELSOFT iQ AppPortal (SW1DND-IQAPL-M)" } ], "category": "vendor", "name": "Mitsubishi Electric" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13938", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "Apache HTTP Server Versions 2.4.0 to 2.4.46 allow unprivileged local users to stop httpd on Windows.CVE-2020-13938 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13938" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-26691", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Apache HTTP Server Versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow.CVE-2021-26691 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26691" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-34798", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server Versions 2.4.48 and earlier.CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34798" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker who can present SM2 content for decryption to an application could cause data to overflow the buffer up to a maximum of 62 bytes, altering the contents of other data held after the buffer or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1 (Affected 1.1.1-1.1.1k). This issue is detailed further in CVE-2021-3711.CVE-2021-3711 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3711" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for this vulnerability, though it might be possible to craft one. This issue affects Apache HTTP Server Versions 2.4.51 and earlier.CVE-2021-44790 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44790" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Apache HTTP Server Versions 2.4.52 and earlier fail to close inbound connections when errors are encountered discarding the request body, exposing the server to HTTP request smuggling.CVE-2022-22720 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22720" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-23943", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 Versions 2.4.52 and earlier.CVE-2022-23943 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23943" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop for non-prime moduli. An attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue, which is further detailed in CVE-2022-0778, affects OpenSSL Versions 1.0.2, 1.1.1, and 3.0.xxxCVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Update to 1.29F or later. Unzip the downloaded file (zip format) and execute the file \u201csetup.exe.\u201d", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/fa/#software" }, { "category": "mitigation", "details": "Restrict network access to the computer running this product so it can be accessed only from trusted networks or hosts.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize user privilege for product users.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Install an antivirus software in the personal computer that runs this product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please follow the safety precautions in the operating manual for the product.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information see Mitsubishi Electric\u0027s advisory 2022-003", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-003_en.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-22-221-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Mitsubishi Electric", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could create a denial-of-service condition or enable arbitrary code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-221-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-221-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-221-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-221-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-221-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Mitsubishi Electric Multiple Factory Automation Products (Update B)", "tracking": { "current_release_date": "2023-02-02T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-221-01", "initial_release_date": "2022-08-30T00:00:00.000000Z", "revision_history": [ { "date": "2022-08-30T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update C)" }, { "date": "2022-11-01T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update A)" }, { "date": "2022-11-02T00:00:00.000000Z", "legacy_version": "B", "number": "3", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update B)" }, { "date": "2023-02-02T00:00:00.000000Z", "legacy_version": "C", "number": "4", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update C)" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 03", "product": { "name": "CC-Link IE TSN Industrial Managed Switch (NZ2MHG-TSNT8F2 NZ2MHG-TSNT4): Version 03 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CC-Link IE TSN Industrial Managed Switch (NZ2MHG-TSNT8F2 NZ2MHG-TSNT4)" }, { "branches": [ { "category": "product_version", "name": "1.275M", "product": { "name": "GOT2000 compatible HMI software (GT SoftGOT2000): Version 1.275M", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "GOT2000 compatible HMI software (GT SoftGOT2000)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 08", "product": { "name": "MELSEC iQ-R Series OPC UA Server Module (RD81OPC96): Version 08 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "MELSEC iQ-R Series OPC UA Server Module (RD81OPC96)" } ], "category": "vendor", "name": "Mitsubishi Electric" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in OpenSSL creates the potential for an infinite loop in the affected product, which could lead to a denial-of-service condition. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "GOT2000 compatible HMI software: Mitsubishi Electric has released a patch for these issues and recommends users update affected products to Version 1.280S or later. Users should contact Mitsubishi Electric to obtain the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric has released fixed firmware for these issues and recommends users update affected products to Version 04 or later. Users should contact Mitsubishi Electric to obtain the fixed firmware version. To update affected CC-Link IE TSN Industrial Managed Switch products log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "To update affected CC-Link IE TSN Industrial Managed Switch products, log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric recommends users to log into NZ2MHG-TSNT8F2 or NZ2MHG-TSNT4 with the web interface and change the username and password from their default setting in [Account Management] on the function menu. They are also recommended to set proper access permissions for different users.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "MELSEC iQ-R Series OPC UA Server Module: Mitsubishi Electric will release fixed software for this device in the near future. Mitsubishi Electric recommends users ensure the OPC UA Client is updated to the latest version and to use legitimate certificates on the OPC UA Client side.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For instructions on how to check the product version and more information regarding contacting Mitsubishi Electric, refer to Mitsubishi Electric\u0027s security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-009_en.pdf" }, { "category": "mitigation", "details": "When internet access is required, use a virtual private network (VPN) to prevent unauthorized access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Use the products within a LAN and block access from untrusted networks and hosts.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Update the OPC UA server to the latest version available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Install antivirus software on computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Restrict physical access to computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2022-1292", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in OpenSSL creates the potential for OS command injection in the affected product, which could lead to arbitrary code execution. CVE-2022-1292 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "GOT2000 compatible HMI software: Mitsubishi Electric has released a patch for these issues and recommends users update affected products to Version 1.280S or later. Users should contact Mitsubishi Electric to obtain the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric has released fixed firmware for these issues and recommends users update affected products to Version 04 or later. Users should contact Mitsubishi Electric to obtain the fixed firmware version. To update affected CC-Link IE TSN Industrial Managed Switch products log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "To update affected CC-Link IE TSN Industrial Managed Switch products, log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric recommends users to log into NZ2MHG-TSNT8F2 or NZ2MHG-TSNT4 with the web interface and change the username and password from their default setting in [Account Management] on the function menu. They are also recommended to set proper access permissions for different users.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "MELSEC iQ-R Series OPC UA Server Module: Mitsubishi Electric will release fixed software for this device in the near future. Mitsubishi Electric recommends users ensure the OPC UA Client is updated to the latest version and to use legitimate certificates on the OPC UA Client side.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For instructions on how to check the product version and more information regarding contacting Mitsubishi Electric, refer to Mitsubishi Electric\u0027s security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-009_en.pdf" }, { "category": "mitigation", "details": "When internet access is required, use a virtual private network (VPN) to prevent unauthorized access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Use the products within a LAN and block access from untrusted networks and hosts.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Update the OPC UA server to the latest version available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Install antivirus software on computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Restrict physical access to computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
icsa-23-059-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause affected modules to stop working.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-059-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-059-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-059-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-059-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/Recommended-Practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://cisa.gov/ics" } ], "title": "Hitachi Energy Gateway Station", "tracking": { "current_release_date": "2023-03-06T19:52:26.287374Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-059-01", "initial_release_date": "2023-03-06T19:52:26.287374Z", "revision_history": [ { "date": "2023-03-06T19:52:26.287374Z", "legacy_version": "1", "number": "1", "summary": "CSAF Creation Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "2.0.0.0", "product": { "name": "Gateway Station (GWS): 2.0.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.1.0.0", "product": { "name": "Gateway Station (GWS): 2.1.0.0", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.2.0.0", "product": { "name": "Gateway Station (GWS): 2.2.0.0", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.3.0.0", "product": { "name": "Gateway Station (GWS): 2.3.0.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.4.0.0", "product": { "name": "Gateway Station (GWS): 2.4.0.0", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "3.0.0.0", "product": { "name": "Gateway Station (GWS): 3.0.0.0", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "3.1.0.0", "product": { "name": "Gateway Station (GWS): 3.1.0.0", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 3.2.0.0", "product": { "name": "Gateway Station (GWS): 3.2.0.0 and earlier", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Gateway Station (GWS)" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference was found in affected versions of OpenLDAP. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a denial-of-service condition on the user authentication function. CVE-2020-25692 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25692" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Hitachi Energy has created an update to address the reported vulnerabilities and recommends users update to at least GWS version 3.3.0.0", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For CVE-2020-25692, the vulnerability impacts GWS if the authentication service is installed. It is not installed by default but is required during the installation process of GWS or installed manually later. Authentication Service (previously ABB Authentication Service) is only needed when GWS users are authenticated using centralized SDM600 user account management.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Hitachi Energy recommends the following general mitigation factors and security practices:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Configure firewalls to protect process control networks from attacks originating from outside the network", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Physically protect process control systems from direct access by unauthorized personnel", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Avoid directly connecting control systems to the internet", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Separate process control networks from other networks using a firewall system with a minimal number of ports exposed", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Enforce proper password policies and processes", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi security advisory 8DBD000118.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000118" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL\u2019s BN_mod_sqrt() function, which computes a modular square root containing a bug that can cause it to loop forever for non-prime moduli. Internally, this function is used when parsing certificates containing elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. Successful exploitation may cause a denial-of-service condition. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Hitachi Energy has created an update to address the reported vulnerabilities and recommends users update to at least GWS version 3.3.0.0", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For CVE-2020-25692, the vulnerability impacts GWS if the authentication service is installed. It is not installed by default but is required during the installation process of GWS or installed manually later. Authentication Service (previously ABB Authentication Service) is only needed when GWS users are authenticated using centralized SDM600 user account management.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Hitachi Energy recommends the following general mitigation factors and security practices:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Configure firewalls to protect process control networks from attacks originating from outside the network", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Physically protect process control systems from direct access by unauthorized personnel", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Avoid directly connecting control systems to the internet", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Separate process control networks from other networks using a firewall system with a minimal number of ports exposed", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Enforce proper password policies and processes", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi security advisory 8DBD000118.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000118" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
ICSA-22-272-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause the affected modules in the product to stop working.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability. This vulnerability is exploitable remotely. This vulnerability has a low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-272-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-272-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-272-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-272-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-272-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Hitachi Energy MicroSCADA Pro X SYS600", "tracking": { "current_release_date": "2022-09-29T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-272-02", "initial_release_date": "2022-09-29T00:00:00.000000Z", "revision_history": [ { "date": "2022-09-29T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.x", "product": { "name": "SYS600: 9.x versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 10.3.1", "product": { "name": "SYS600: 10.3.1 and earlier", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SYS600" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "Hitachi Energy is aware of public reports of vulnerabilities in third-party open-source software components (OpenLDAP and OpenSSL) used in MicroSCADA Pro/X SYS600 products.CVE-2020-25692 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25692" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "For SYS600 9.4: upgrade to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "For SYS600 10.x: update to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends following 1MRK511518 MicroSCADA X Cyber Security Deployment Guidelines.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For additional information and support, users should contact Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.hitachienergy.com/contact-us/" }, { "category": "mitigation", "details": "Physically protect process control systems from unauthorized direct access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from the internet and other networks using firewall system with minimal open ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or email.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000107.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000107" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-1357", "name": "Reliance on Insufficiently Trustworthy Component" }, "notes": [ { "category": "summary", "text": "Hitachi Energy is aware of public reports of vulnerabilities in third-party open-source software components (OpenLDAP and OpenSSL) used in MicroSCADA Pro/X SYS600 products.CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "For SYS600 9.4: upgrade to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "For SYS600 10.x: update to at least SYS600 version 10.4.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends following 1MRK511518 MicroSCADA X Cyber Security Deployment Guidelines.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For additional information and support, users should contact Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.hitachienergy.com/contact-us/" }, { "category": "mitigation", "details": "Physically protect process control systems from unauthorized direct access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Separate process control systems from the internet and other networks using firewall system with minimal open ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or email.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy advisory 8DBD000107.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000107" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
ICSA-23-348-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nThese GNU/Linux vulnerabilities have been externally identified. Siemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.\n\nNote: This SSA advises vulnerabilities for firmware version V3.1 only; for versions \u003c V3.1 refer to Siemens Security Bulletin SSB-439005 (\nhttps://cert-portal.siemens.com/productcert/html/ssb-439005.html).", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-398330.json" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html" }, { "category": "self", "summary": "ICS Advisory ICSA-23-348-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-348-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-348-10 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1", "tracking": { "current_release_date": "2024-11-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-348-10", "initial_release_date": "2023-12-12T00:00:00.000000Z", "revision_history": [ { "date": "2023-12-12T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2021-44879, CVE-2023-46218, CVE-2023-46219, and CVE-2023-48795" }, { "date": "2024-02-13T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-45898, CVE-2023-46862, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2024-0584" }, { "date": "2024-03-12T00:00:00.000000Z", "legacy_version": "1.3", "number": "4", "summary": "Added CVE-2023-52425, CVE-2023-52426, CVE-2023-45918" }, { "date": "2024-04-09T00:00:00.000000Z", "legacy_version": "1.4", "number": "5", "summary": "Added CVE-2024-28757" }, { "date": "2024-05-14T00:00:00.000000Z", "legacy_version": "1.5", "number": "6", "summary": "Added CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-2511, CVE-2024-28085, CVE-2024-28182, CVE-2024-28834, CVE-2024-28835" }, { "date": "2024-06-11T00:00:00.000000Z", "legacy_version": "1.6", "number": "7", "summary": "Added CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34459" }, { "date": "2024-07-09T00:00:00.000000Z", "legacy_version": "1.7", "number": "8", "summary": "Added CVE-2024-5535, CVE-2024-5742" }, { "date": "2024-08-13T00:00:00.000000Z", "legacy_version": "1.8", "number": "9", "summary": "Added CVE-2017-15422, CVE-2024-7264, CVE-2024-37370, CVE-2024-37371" }, { "date": "2024-10-08T00:00:00.000000Z", "legacy_version": "1.9", "number": "10", "summary": "Added CVE-2024-6409, CVE-2024-8096, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492" }, { "date": "2024-11-12T00:00:00.000000Z", "legacy_version": "2.0", "number": "11", "summary": "Added CVE-2024-2236, CVE-2024-9143" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6AG1518-4AX00-4AC0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0340", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2013-0340" }, { "cve": "CVE-2013-4235", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "summary", "text": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2013-4235" }, { "cve": "CVE-2014-7209", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2014-7209" }, { "cve": "CVE-2015-20107", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-20107" }, { "cve": "CVE-2016-3189", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-3189" }, { "cve": "CVE-2016-3709", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-3709" }, { "cve": "CVE-2016-4658", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-4658" }, { "cve": "CVE-2016-5131", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-5131" }, { "cve": "CVE-2016-9318", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-9318" }, { "cve": "CVE-2016-10228", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10228" }, { "cve": "CVE-2016-10739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10739" }, { "cve": "CVE-2017-0663", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-0663" }, { "cve": "CVE-2017-7375", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-7375" }, { "cve": "CVE-2017-7376", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-7376" }, { "cve": "CVE-2017-9047", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9047" }, { "cve": "CVE-2017-9048", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9048" }, { "cve": "CVE-2017-9049", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9049" }, { "cve": "CVE-2017-9050", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9050" }, { "cve": "CVE-2017-15422", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-15422" }, { "cve": "CVE-2017-16931", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a \u0027%\u0027 character in a DTD name.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-16931" }, { "cve": "CVE-2017-16932", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-16932" }, { "cve": "CVE-2017-17512", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-17512" }, { "cve": "CVE-2017-18258", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-18258" }, { "cve": "CVE-2018-0495", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-0495" }, { "cve": "CVE-2018-12886", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-12886" }, { "cve": "CVE-2018-14404", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14567", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-14567" }, { "cve": "CVE-2018-18928", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-18928" }, { "cve": "CVE-2018-19591", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-19591" }, { "cve": "CVE-2018-20482", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user\u0027s process (e.g., a system backup running as root).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20482" }, { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20843" }, { "cve": "CVE-2018-25032", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-25032" }, { "cve": "CVE-2019-3855", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3855" }, { "cve": "CVE-2019-3856", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3856" }, { "cve": "CVE-2019-3857", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3857" }, { "cve": "CVE-2019-3858", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3858" }, { "cve": "CVE-2019-3859", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3859" }, { "cve": "CVE-2019-3860", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3860" }, { "cve": "CVE-2019-3861", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3861" }, { "cve": "CVE-2019-3862", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3862" }, { "cve": "CVE-2019-3863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3863" }, { "cve": "CVE-2019-5018", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5018" }, { "cve": "CVE-2019-5094", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5094" }, { "cve": "CVE-2019-5188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5188" }, { "cve": "CVE-2019-5435", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in curl\u0027s URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5435" }, { "cve": "CVE-2019-5436", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5436" }, { "cve": "CVE-2019-5443", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl \u003c= 7.65.1 automatically run the code (as an openssl \"engine\") on invocation. If that curl is invoked by a privileged user it can do anything it wants.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5443" }, { "cve": "CVE-2019-5481", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5481" }, { "cve": "CVE-2019-5482", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5482" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-6488", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6488" }, { "cve": "CVE-2019-7309", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-7309" }, { "cve": "CVE-2019-8457", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-8457" }, { "cve": "CVE-2019-9169", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9169" }, { "cve": "CVE-2019-9636", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9636" }, { "cve": "CVE-2019-9674", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9674" }, { "cve": "CVE-2019-9740", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9740" }, { "cve": "CVE-2019-9923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9923" }, { "cve": "CVE-2019-9936", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9936" }, { "cve": "CVE-2019-9937", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9937" }, { "cve": "CVE-2019-9947", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9947" }, { "cve": "CVE-2019-9948", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9948" }, { "cve": "CVE-2019-10160", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "summary", "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-10160" }, { "cve": "CVE-2019-11360", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-11360" }, { "cve": "CVE-2019-12290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-12290" }, { "cve": "CVE-2019-12900", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-12900" }, { "cve": "CVE-2019-12904", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor\u0027s position is that the issue report cannot be validated because there is no description of an attack", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-12904" }, { "cve": "CVE-2019-13057", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-13057" }, { "cve": "CVE-2019-13565", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-13565" }, { "cve": "CVE-2019-13627", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-13627" }, { "cve": "CVE-2019-15847", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-15847" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-15903" }, { "cve": "CVE-2019-16056", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16056" }, { "cve": "CVE-2019-16168", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16168" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16905" }, { "cve": "CVE-2019-17498", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17498" }, { "cve": "CVE-2019-17543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17543" }, { "cve": "CVE-2019-17594", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17594" }, { "cve": "CVE-2019-17595", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17595" }, { "cve": "CVE-2019-18224", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-18224" }, { "cve": "CVE-2019-18276", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "summary", "text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-18276" }, { "cve": "CVE-2019-18348", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-18348" }, { "cve": "CVE-2019-19126", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19126" }, { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19906", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19906" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2019-19956", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19956" }, { "cve": "CVE-2019-19959", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \u0027\\0\u0027 characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19959" }, { "cve": "CVE-2019-20218", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20218" }, { "cve": "CVE-2019-20367", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20367" }, { "cve": "CVE-2019-20388", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20388" }, { "cve": "CVE-2019-20795", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20795" }, { "cve": "CVE-2019-20907", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20907" }, { "cve": "CVE-2019-25013", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-25013" }, { "cve": "CVE-2019-1010022", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010022" }, { "cve": "CVE-2019-1010023", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010023" }, { "cve": "CVE-2019-1010024", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010024" }, { "cve": "CVE-2019-1010025", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor\u0027s position is \"ASLR bypass itself is not a vulnerability.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010025" }, { "cve": "CVE-2019-1010180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010180" }, { "cve": "CVE-2020-1712", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-1712" }, { "cve": "CVE-2020-1751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-1752" }, { "cve": "CVE-2020-6096", "cwe": { "id": "CWE-195", "name": "Signed to Unsigned Conversion Error" }, "notes": [ { "category": "summary", "text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-6096" }, { "cve": "CVE-2020-7595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-7595" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8315", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker\u0027s copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system\u0027s copy. Windows 8 and later are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8315" }, { "cve": "CVE-2020-8492", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8492" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-10029", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10029" }, { "cve": "CVE-2020-10531", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10531" }, { "cve": "CVE-2020-10543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10543" }, { "cve": "CVE-2020-10735", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10878", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10878" }, { "cve": "CVE-2020-11501", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 \u0027\\0\u0027 bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-11501" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-12062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12062" }, { "cve": "CVE-2020-12243", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12243" }, { "cve": "CVE-2020-12723", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12723" }, { "cve": "CVE-2020-12762", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12762" }, { "cve": "CVE-2020-13434", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13434" }, { "cve": "CVE-2020-13435", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13435" }, { "cve": "CVE-2020-13529", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13529" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13776", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13776" }, { "cve": "CVE-2020-13777", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13777" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-14145", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-14145" }, { "cve": "CVE-2020-14422", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-14422" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-15523", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15523" }, { "cve": "CVE-2020-15778", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15778" }, { "cve": "CVE-2020-15801", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15801" }, { "cve": "CVE-2020-19185", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19185" }, { "cve": "CVE-2020-19186", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19186" }, { "cve": "CVE-2020-19187", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19187" }, { "cve": "CVE-2020-19188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19188" }, { "cve": "CVE-2020-19189", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19189" }, { "cve": "CVE-2020-19190", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19190" }, { "cve": "CVE-2020-19909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19909" }, { "cve": "CVE-2020-21047", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-21047" }, { "cve": "CVE-2020-21913", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-21913" }, { "cve": "CVE-2020-22218", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-22218" }, { "cve": "CVE-2020-24659", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-24659" }, { "cve": "CVE-2020-24977", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-24977" }, { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25692" }, { "cve": "CVE-2020-25709", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25709" }, { "cve": "CVE-2020-25710", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25710" }, { "cve": "CVE-2020-26116", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-26116" }, { "cve": "CVE-2020-27618", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-27618" }, { "cve": "CVE-2020-28196", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-28196" }, { "cve": "CVE-2020-29361", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29361" }, { "cve": "CVE-2020-29362", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29362" }, { "cve": "CVE-2020-29363", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29363" }, { "cve": "CVE-2020-29562", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29562" }, { "cve": "CVE-2020-29573", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29573" }, { "cve": "CVE-2020-35525", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-35525" }, { "cve": "CVE-2020-35527", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-35527" }, { "cve": "CVE-2020-36221", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36221" }, { "cve": "CVE-2020-36222", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36222" }, { "cve": "CVE-2020-36223", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36223" }, { "cve": "CVE-2020-36224", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36224" }, { "cve": "CVE-2020-36225", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36225" }, { "cve": "CVE-2020-36226", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36226" }, { "cve": "CVE-2020-36227", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36227" }, { "cve": "CVE-2020-36228", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36228" }, { "cve": "CVE-2020-36229", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36229" }, { "cve": "CVE-2020-36230", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36230" }, { "cve": "CVE-2021-3177", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3177" }, { "cve": "CVE-2021-3326", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3326" }, { "cve": "CVE-2021-3426", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3426" }, { "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3516" }, { "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3517" }, { "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3520", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3541", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3541" }, { "cve": "CVE-2021-3580", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3580" }, { "cve": "CVE-2021-3733", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3826", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3997", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3997" }, { "cve": "CVE-2021-3998", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3998" }, { "cve": "CVE-2021-3999", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4122", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-4122" }, { "cve": "CVE-2021-4189", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-4189" }, { "cve": "CVE-2021-4209", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in GnuTLS. As Nettle\u0027s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-4209" }, { "cve": "CVE-2021-20193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20193" }, { "cve": "CVE-2021-20227", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in SQLite\u0027s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20227" }, { "cve": "CVE-2021-20231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20231" }, { "cve": "CVE-2021-20232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20232" }, { "cve": "CVE-2021-20305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20305" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "**NOTE: CVE-2021-22898 is an incomplete fix (see https://hackerone.com/reports/1223882)! Check if affected products also have fixed CVE-22925 instead! Do not use CVE-2021-22898 in public advisories!**\r\n\r\ncurl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl. This rarely used option is used to send variable=content pairs to TELNET servers. Due to flaw in the option parser for sending `NEW_ENV` variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol. This could happen because curl did not call and use sscanf() correctly when parsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23336", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-23336" }, { "cve": "CVE-2021-27212", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27212" }, { "cve": "CVE-2021-27218", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27218" }, { "cve": "CVE-2021-27219", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27219" }, { "cve": "CVE-2021-27645", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27645" }, { "cve": "CVE-2021-28041", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28041" }, { "cve": "CVE-2021-28153", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28363", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn\u0027t given via proxy_config) doesn\u0027t verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28363" }, { "cve": "CVE-2021-28861", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28861" }, { "cve": "CVE-2021-31239", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue found in SQLite SQLite3 v.3.35.4 that could allow a remote attacker to cause a denial of service via the appendvfs.c function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-31239" }, { "cve": "CVE-2021-32292", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-32292" }, { "cve": "CVE-2021-33294", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33294" }, { "cve": "CVE-2021-33560", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33560" }, { "cve": "CVE-2021-33574", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33574" }, { "cve": "CVE-2021-33910", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33910" }, { "cve": "CVE-2021-35942", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-35942" }, { "cve": "CVE-2021-36084", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36084" }, { "cve": "CVE-2021-36085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36085" }, { "cve": "CVE-2021-36086", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36086" }, { "cve": "CVE-2021-36087", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36087" }, { "cve": "CVE-2021-36222", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-36690", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36690" }, { "cve": "CVE-2021-37600", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-37600" }, { "cve": "CVE-2021-37750", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-37750" }, { "cve": "CVE-2021-38604", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-38604" }, { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-41617" }, { "cve": "CVE-2021-43396", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious \u0027\\0\u0027 character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states \"the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there\u0027s no security impact to the bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-43396" }, { "cve": "CVE-2021-43618", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-43618" }, { "cve": "CVE-2021-44879", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45960", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46143" }, { "cve": "CVE-2021-46195", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0391", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like \u0027\\r\u0027 and \u0027\\n\u0027 in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0563", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-0563" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1271", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1304", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1343", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1343" }, { "cve": "CVE-2022-1434", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1434" }, { "cve": "CVE-2022-1473", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1473" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2274", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2274" }, { "cve": "CVE-2022-2509", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2509" }, { "cve": "CVE-2022-3715", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3821", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3821" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-22576", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22576" }, { "cve": "CVE-2022-22822", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23852", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23990", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26488", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-26488" }, { "cve": "CVE-2022-27774", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl\u0027s \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "summary", "text": "The curl URL parser wrongly accepts percent-encoded URL separators like \u0027/\u0027when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server\u0027s certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27943" }, { "cve": "CVE-2022-28321", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn\u0027t correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-28321" }, { "cve": "CVE-2022-29155", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-29155" }, { "cve": "CVE-2022-29824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-29824" }, { "cve": "CVE-2022-30115", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-30115" }, { "cve": "CVE-2022-32205", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32221" }, { "cve": "CVE-2022-35252", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "summary", "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-35737" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-40674" }, { "cve": "CVE-2022-42898", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42915", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in curl \u003c7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop U+002E (.). Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-43680" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46908", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-46908" }, { "cve": "CVE-2022-48303", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48522", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-48522" }, { "cve": "CVE-2022-48560", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-48560" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0361", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0687", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It\u0027s basically trusted input or input that needs an actual security flaw to be compromised or controlled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0687" }, { "cve": "CVE-2023-1077", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1206", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-1206" }, { "cve": "CVE-2023-2650", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(square(n)) with \u0027n\u0027 being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer\u0027s certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-2650" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3212", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3212" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3609", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3609" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3772", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3772" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4016", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4016" }, { "cve": "CVE-2023-4039", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "summary", "text": "A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4039" }, { "cve": "CVE-2023-4527", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4527" }, { "cve": "CVE-2023-4623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-4806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4806" }, { "cve": "CVE-2023-4807", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4813", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4813" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-4921", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-5156", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5156" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5717", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5717" }, { "cve": "CVE-2023-5981", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5981" }, { "cve": "CVE-2023-6121", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6121" }, { "cve": "CVE-2023-6817", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6817" }, { "cve": "CVE-2023-6931", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6932" }, { "cve": "CVE-2023-23914", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \"links\" in this \"decompression chain\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24329", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25136", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-25136" }, { "cve": "CVE-2023-25139", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-25139" }, { "cve": "CVE-2023-26604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27371", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more \u0027\\0\u0027 bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27371" }, { "cve": "CVE-2023-27533", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \"telnet options\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application\u0027s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse. libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27538" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-28531", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-28531" }, { "cve": "CVE-2023-29383", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-29491", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29491" }, { "cve": "CVE-2023-29499", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29499" }, { "cve": "CVE-2023-31085", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-31085" }, { "cve": "CVE-2023-32611", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32611" }, { "cve": "CVE-2023-32636", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32636" }, { "cve": "CVE-2023-32643", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32643" }, { "cve": "CVE-2023-32665", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32665" }, { "cve": "CVE-2023-34319", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The fix for XSA-423 added logic to Linux\u0027es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn\u0027t account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that\u0027s specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-34319" }, { "cve": "CVE-2023-34969", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35945", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy\u2019s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-35945" }, { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-38408" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "summary", "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-39128", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39128" }, { "cve": "CVE-2023-39189", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39189" }, { "cve": "CVE-2023-39192", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-39194", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39194" }, { "cve": "CVE-2023-39615", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor\u0027s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39615" }, { "cve": "CVE-2023-40283", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-40283" }, { "cve": "CVE-2023-42754", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42755", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-42755" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45322", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor\u0027s position is \"I don\u0027t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can\u0027t control when memory allocations fail.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45322" }, { "cve": "CVE-2023-45853", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45853" }, { "cve": "CVE-2023-45871", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45871" }, { "cve": "CVE-2023-45898", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45898" }, { "cve": "CVE-2023-45918", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45918" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-46862", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-46862" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-0584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-0584" }, { "cve": "CVE-2024-2004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2004" }, { "cve": "CVE-2024-2236", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing-based side-channel flaw was found in libgcrypt\u0027s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2236" }, { "cve": "CVE-2024-2379", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2379" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-2466", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "notes": [ { "category": "summary", "text": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2466" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions\r\nImpact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5742", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-5742" }, { "cve": "CVE-2024-6409", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "notes": [ { "category": "summary", "text": "A race condition vulnerability was discovered in how signals are handled by OpenSSH\u0027s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd\u0027s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-6409" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-8096", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than \u0027revoked\u0027 (like for example \u0027unauthorized\u0027) it is not treated as a bad certficate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-8096" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-28085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28085" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28757", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28757" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "notes": [ { "category": "summary", "text": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28835" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow. This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference. This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients. The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34459", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-34459" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-45492" } ] }
ICSA-23-059-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause affected modules to stop working.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-059-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-059-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-059-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-059-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/Recommended-Practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://cisa.gov/ics" } ], "title": "Hitachi Energy Gateway Station", "tracking": { "current_release_date": "2023-03-06T19:52:26.287374Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-059-01", "initial_release_date": "2023-03-06T19:52:26.287374Z", "revision_history": [ { "date": "2023-03-06T19:52:26.287374Z", "legacy_version": "1", "number": "1", "summary": "CSAF Creation Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "2.0.0.0", "product": { "name": "Gateway Station (GWS): 2.0.0.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.1.0.0", "product": { "name": "Gateway Station (GWS): 2.1.0.0", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.2.0.0", "product": { "name": "Gateway Station (GWS): 2.2.0.0", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.3.0.0", "product": { "name": "Gateway Station (GWS): 2.3.0.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "2.4.0.0", "product": { "name": "Gateway Station (GWS): 2.4.0.0", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "3.0.0.0", "product": { "name": "Gateway Station (GWS): 3.0.0.0", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version", "name": "3.1.0.0", "product": { "name": "Gateway Station (GWS): 3.1.0.0", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "Gateway Station (GWS)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 3.2.0.0", "product": { "name": "Gateway Station (GWS): 3.2.0.0 and earlier", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "Gateway Station (GWS)" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference was found in affected versions of OpenLDAP. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a denial-of-service condition on the user authentication function. CVE-2020-25692 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25692" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Hitachi Energy has created an update to address the reported vulnerabilities and recommends users update to at least GWS version 3.3.0.0", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For CVE-2020-25692, the vulnerability impacts GWS if the authentication service is installed. It is not installed by default but is required during the installation process of GWS or installed manually later. Authentication Service (previously ABB Authentication Service) is only needed when GWS users are authenticated using centralized SDM600 user account management.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Hitachi Energy recommends the following general mitigation factors and security practices:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Configure firewalls to protect process control networks from attacks originating from outside the network", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Physically protect process control systems from direct access by unauthorized personnel", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Avoid directly connecting control systems to the internet", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Separate process control networks from other networks using a firewall system with a minimal number of ports exposed", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Enforce proper password policies and processes", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi security advisory 8DBD000118.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000118" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL\u2019s BN_mod_sqrt() function, which computes a modular square root containing a bug that can cause it to loop forever for non-prime moduli. Internally, this function is used when parsing certificates containing elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. Successful exploitation may cause a denial-of-service condition. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Hitachi Energy has created an update to address the reported vulnerabilities and recommends users update to at least GWS version 3.3.0.0", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For CVE-2020-25692, the vulnerability impacts GWS if the authentication service is installed. It is not installed by default but is required during the installation process of GWS or installed manually later. Authentication Service (previously ABB Authentication Service) is only needed when GWS users are authenticated using centralized SDM600 user account management.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Hitachi Energy recommends the following general mitigation factors and security practices:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Configure firewalls to protect process control networks from attacks originating from outside the network", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Physically protect process control systems from direct access by unauthorized personnel", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Avoid directly connecting control systems to the internet", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Separate process control networks from other networks using a firewall system with a minimal number of ports exposed", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Enforce proper password policies and processes", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "For more information, see Hitachi security advisory 8DBD000118.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000118" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
ICSA-22-167-14
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could create a denial-of-service condition in the affected products.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-712929.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-14 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-14.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-14 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-14" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-712929.html" }, { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "category": "external", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-712929.txt" } ], "title": "Siemens OpenSSL Affected Industrial Products (Update C)", "tracking": { "current_release_date": "2022-06-16T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-167-14", "initial_release_date": "2022-06-16T00:00:00.000000Z", "revision_history": [ { "date": "2022-06-16T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-167-14 Siemens OpenSSL Affected Industrial Products" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.6 Upd6", "product": { "name": " SIMATIC Logon V1.6", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": " SIMATIC Logon V1.6" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.7", "product": { "name": "Industrial Edge - OPC UA Connector", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Industrial Edge - OPC UA Connector" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.7", "product": { "name": "Industrial Edge - SIMATIC S7 Connector App", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Industrial Edge - SIMATIC S7 Connector App" }, { "branches": [ { "category": "product_version_range", "name": "All versions only when running on ROX II \u003c V2.15.1", "product": { "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2BA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)", "product_id": "CSAFPID-0006", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2DA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000RE", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000RE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1400", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1400" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1500", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1500" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1501", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1501" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1510", "product_id": "CSAFPID-00012" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1510" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1511", "product_id": "CSAFPID-00013" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1511" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1512", "product_id": "CSAFPID-00014" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1512" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1524", "product_id": "CSAFPID-00015" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1524" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1536", "product_id": "CSAFPID-00016" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1536" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX5000", "product_id": "CSAFPID-00017" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)", "product_id": "CSAFPID-00018", "product_identification_helper": { "model_numbers": [ "6GK5998-3GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)", "product_id": "CSAFPID-00019", "product_identification_helper": { "model_numbers": [ "6GK5804-0AP00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)", "product_id": "CSAFPID-00020", "product_identification_helper": { "model_numbers": [ "6GK5812-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)", "product_id": "CSAFPID-00021", "product_identification_helper": { "model_numbers": [ "6GK5812-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)", "product_id": "CSAFPID-00022", "product_identification_helper": { "model_numbers": [ "6GK5816-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)", "product_id": "CSAFPID-00023", "product_identification_helper": { "model_numbers": [ "6GK5816-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)", "product_id": "CSAFPID-00024", "product_identification_helper": { "model_numbers": [ "6GK5826-2AB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)", "product_id": "CSAFPID-00025", "product_identification_helper": { "model_numbers": [ "6GK5874-2AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)", "product_id": "CSAFPID-00026", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)", "product_id": "CSAFPID-00027", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)", "product_id": "CSAFPID-00028", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2EA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)", "product_id": "CSAFPID-00029", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA10-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)", "product_id": "CSAFPID-00030", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)", "product_id": "CSAFPID-00031", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2DA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)", "product_id": "CSAFPID-00032", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA00-2DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)", "product_id": "CSAFPID-00033", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)", "product_id": "CSAFPID-00034", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)", "product_id": "CSAFPID-00035", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV7.2", "product": { "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)", "product_id": "CSAFPID-00036", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA01-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)", "product_id": "CSAFPID-00037", "product_identification_helper": { "model_numbers": [ "6GK5622-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)", "product_id": "CSAFPID-00038", "product_identification_helper": { "model_numbers": [ "6GK5632-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)", "product_id": "CSAFPID-00039", "product_identification_helper": { "model_numbers": [ "6GK5636-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)", "product_id": "CSAFPID-00040", "product_identification_helper": { "model_numbers": [ "6GK5642-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.1", "product": { "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)", "product_id": "CSAFPID-00041", "product_identification_helper": { "model_numbers": [ "6GK5646-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)", "product_id": "CSAFPID-00042", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)", "product_id": "CSAFPID-00043", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)", "product_id": "CSAFPID-00044", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AD0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)", "product_id": "CSAFPID-00045", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)", "product_id": "CSAFPID-00046", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)", "product_id": "CSAFPID-00047", "product_identification_helper": { "model_numbers": [ "6GK5788-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)", "product_id": "CSAFPID-00048", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)", "product_id": "CSAFPID-00049", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)", "product_id": "CSAFPID-00050", "product_identification_helper": { "model_numbers": [ "6GK5788-2HY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)", "product_id": "CSAFPID-00051", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)", "product_id": "CSAFPID-00052", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)", "product_id": "CSAFPID-00053", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)", "product_id": "CSAFPID-00054", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)", "product_id": "CSAFPID-00055", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)", "product_id": "CSAFPID-00056", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)", "product_id": "CSAFPID-00057", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)", "product_id": "CSAFPID-00058", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)", "product_id": "CSAFPID-00059", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)", "product_id": "CSAFPID-00060", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)", "product_id": "CSAFPID-00061", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)", "product_id": "CSAFPID-00062", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)", "product_id": "CSAFPID-00063", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)", "product_id": "CSAFPID-00064", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)", "product_id": "CSAFPID-00065", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)", "product_id": "CSAFPID-00066", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)", "product_id": "CSAFPID-00067", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)", "product_id": "CSAFPID-00068", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)", "product_id": "CSAFPID-00069", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)", "product_id": "CSAFPID-00070", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)", "product_id": "CSAFPID-00071", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)", "product_id": "CSAFPID-00072", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)", "product_id": "CSAFPID-00073", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)", "product_id": "CSAFPID-00074", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)", "product_id": "CSAFPID-00075", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)", "product_id": "CSAFPID-00076", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)", "product_id": "CSAFPID-00077", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)", "product_id": "CSAFPID-00078", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)", "product_id": "CSAFPID-00079", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)", "product_id": "CSAFPID-00080", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)", "product_id": "CSAFPID-00081", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)", "product_id": "CSAFPID-00082", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)", "product_id": "CSAFPID-00083", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)", "product_id": "CSAFPID-00084", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)", "product_id": "CSAFPID-00085", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)", "product_id": "CSAFPID-00086", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)", "product_id": "CSAFPID-00087", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)", "product_id": "CSAFPID-00088", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)", "product_id": "CSAFPID-00089", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)", "product_id": "CSAFPID-00090", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)", "product_id": "CSAFPID-00091", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)", "product_id": "CSAFPID-00092", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)", "product_id": "CSAFPID-00093", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)", "product_id": "CSAFPID-00094", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)", "product_id": "CSAFPID-00095", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)", "product_id": "CSAFPID-00096", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)", "product_id": "CSAFPID-00097", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)", "product_id": "CSAFPID-00098", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)", "product_id": "CSAFPID-00099", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)", "product_id": "CSAFPID-000100", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)", "product_id": "CSAFPID-000101", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)", "product_id": "CSAFPID-000102", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)", "product_id": "CSAFPID-000103", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)", "product_id": "CSAFPID-000104", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)", "product_id": "CSAFPID-000105", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)", "product_id": "CSAFPID-000106", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)", "product_id": "CSAFPID-000107", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)", "product_id": "CSAFPID-000108", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)", "product_id": "CSAFPID-000109", "product_identification_helper": { "model_numbers": [ "6GK5200-4AH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)", "product_id": "CSAFPID-000110", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)", "product_id": "CSAFPID-000111", "product_identification_helper": { "model_numbers": [ "6GK5201-3JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)", "product_id": "CSAFPID-000112", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)", "product_id": "CSAFPID-000113", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)", "product_id": "CSAFPID-000114", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)", "product_id": "CSAFPID-000115", "product_identification_helper": { "model_numbers": [ "6GK5202-2JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)", "product_id": "CSAFPID-000116", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)", "product_id": "CSAFPID-000117", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB11-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)", "product_id": "CSAFPID-000118", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)", "product_id": "CSAFPID-000119", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)", "product_id": "CSAFPID-000120", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)", "product_id": "CSAFPID-000121", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)", "product_id": "CSAFPID-000122", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)", "product_id": "CSAFPID-000123", "product_identification_helper": { "model_numbers": [ "6GK5204-0JA00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)", "product_id": "CSAFPID-000124", "product_identification_helper": { "model_numbers": [ "6GK5206-1BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)", "product_id": "CSAFPID-000125", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)", "product_id": "CSAFPID-000126", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)", "product_id": "CSAFPID-000127", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA10-2AA6" ] } } } ], "category": "product_name", "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)", "product_id": "CSAFPID-000128", "product_identification_helper": { "model_numbers": [ "6GK5212-2BB00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)", "product_id": "CSAFPID-000129", "product_identification_helper": { "model_numbers": [ "6GK5212-2BC00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)", "product_id": "CSAFPID-000130", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)", "product_id": "CSAFPID-000131", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)", "product_id": "CSAFPID-000132", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)", "product_id": "CSAFPID-000133", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)", "product_id": "CSAFPID-000134", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)", "product_id": "CSAFPID-000135", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)", "product_id": "CSAFPID-000136", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)", "product_id": "CSAFPID-000137", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)", "product_id": "CSAFPID-000138", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)", "product_id": "CSAFPID-000139", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)", "product_id": "CSAFPID-000140", "product_identification_helper": { "model_numbers": [ "6GK5304-2BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)", "product_id": "CSAFPID-000141", "product_identification_helper": { "model_numbers": [ "6GK5306-1BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)", "product_id": "CSAFPID-000142", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)", "product_id": "CSAFPID-000143", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)", "product_id": "CSAFPID-000144", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)", "product_id": "CSAFPID-000145", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)", "product_id": "CSAFPID-000146", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)", "product_id": "CSAFPID-000147", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)", "product_id": "CSAFPID-000148", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)", "product_id": "CSAFPID-000149", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)", "product_id": "CSAFPID-000150", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)", "product_id": "CSAFPID-000151", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)", "product_id": "CSAFPID-000152", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)", "product_id": "CSAFPID-000153", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)", "product_id": "CSAFPID-000154", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)", "product_id": "CSAFPID-000155", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)", "product_id": "CSAFPID-000156", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)", "product_id": "CSAFPID-000157", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)", "product_id": "CSAFPID-000158", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)", "product_id": "CSAFPID-000159", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)", "product_id": "CSAFPID-000160", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)", "product_id": "CSAFPID-000161", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)", "product_id": "CSAFPID-000162", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)", "product_id": "CSAFPID-000163", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)", "product_id": "CSAFPID-000164", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)", "product_id": "CSAFPID-000165", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)", "product_id": "CSAFPID-000166", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)", "product_id": "CSAFPID-000167", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)", "product_id": "CSAFPID-000168", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)", "product_id": "CSAFPID-000169", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)", "product_id": "CSAFPID-000170", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)", "product_id": "CSAFPID-000171", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)", "product_id": "CSAFPID-000172", "product_identification_helper": { "model_numbers": [ "6GK5320-1BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)", "product_id": "CSAFPID-000173", "product_identification_helper": { "model_numbers": [ "6GK5320-3BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)", "product_id": "CSAFPID-000174", "product_identification_helper": { "model_numbers": [ "6GK5408-2FD00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)", "product_id": "CSAFPID-000175", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)", "product_id": "CSAFPID-000176", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)", "product_id": "CSAFPID-000177", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)", "product_id": "CSAFPID-000178", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)", "product_id": "CSAFPID-000179", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)", "product_id": "CSAFPID-000180", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)", "product_id": "CSAFPID-000181", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)", "product_id": "CSAFPID-000182", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)", "product_id": "CSAFPID-000183", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)", "product_id": "CSAFPID-000184", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)", "product_id": "CSAFPID-000185", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)", "product_id": "CSAFPID-000186", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)", "product_id": "CSAFPID-000187", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)", "product_id": "CSAFPID-000188", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)", "product_id": "CSAFPID-000189", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)", "product_id": "CSAFPID-000190", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)", "product_id": "CSAFPID-000191", "product_identification_helper": { "model_numbers": [ "6GK5206-2BD00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)", "product_id": "CSAFPID-000192", "product_identification_helper": { "model_numbers": [ "6GK5206-2BB00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)", "product_id": "CSAFPID-000193", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)", "product_id": "CSAFPID-000194", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)", "product_id": "CSAFPID-000195", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)", "product_id": "CSAFPID-000196", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)", "product_id": "CSAFPID-000197", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)", "product_id": "CSAFPID-000198", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)", "product_id": "CSAFPID-000199", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)", "product_id": "CSAFPID-000200", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)", "product_id": "CSAFPID-000201", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)", "product_id": "CSAFPID-000202", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)", "product_id": "CSAFPID-000203", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)", "product_id": "CSAFPID-000204", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)", "product_id": "CSAFPID-000205", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)", "product_id": "CSAFPID-000206", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)", "product_id": "CSAFPID-000207", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)", "product_id": "CSAFPID-000208", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)", "product_id": "CSAFPID-000209", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)", "product_id": "CSAFPID-000210", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)", "product_id": "CSAFPID-000211", "product_identification_helper": { "model_numbers": [ "6GK5216-4BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)", "product_id": "CSAFPID-000212", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)", "product_id": "CSAFPID-000213", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)", "product_id": "CSAFPID-000214", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)", "product_id": "CSAFPID-000215", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)", "product_id": "CSAFPID-000216", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)", "product_id": "CSAFPID-000217", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)", "product_id": "CSAFPID-000218", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)", "product_id": "CSAFPID-000219", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)", "product_id": "CSAFPID-000220", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)", "product_id": "CSAFPID-000221", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)", "product_id": "CSAFPID-000222", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)", "product_id": "CSAFPID-000223", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)", "product_id": "CSAFPID-000224", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)", "product_id": "CSAFPID-000225", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)", "product_id": "CSAFPID-000226", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)", "product_id": "CSAFPID-000227", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)", "product_id": "CSAFPID-000228", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)", "product_id": "CSAFPID-000229", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)", "product_id": "CSAFPID-000230", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)", "product_id": "CSAFPID-000231", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)", "product_id": "CSAFPID-000232", "product_identification_helper": { "model_numbers": [ "6GK5408-4GP00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)", "product_id": "CSAFPID-000233", "product_identification_helper": { "model_numbers": [ "6GK5408-4GQ00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)", "product_id": "CSAFPID-000234", "product_identification_helper": { "model_numbers": [ "6GK5408-8GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)", "product_id": "CSAFPID-000235", "product_identification_helper": { "model_numbers": [ "6GK5408-8GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)", "product_id": "CSAFPID-000236", "product_identification_helper": { "model_numbers": [ "6GK5416-4GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)", "product_id": "CSAFPID-000237", "product_identification_helper": { "model_numbers": [ "6GK5416-4GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)", "product_id": "CSAFPID-000238", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)", "product_id": "CSAFPID-000239", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)", "product_id": "CSAFPID-000240", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)", "product_id": "CSAFPID-000241", "product_identification_helper": { "model_numbers": [ "6GK5208-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)", "product_id": "CSAFPID-000242", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)", "product_id": "CSAFPID-000243", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)", "product_id": "CSAFPID-000244", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)", "product_id": "CSAFPID-000245", "product_identification_helper": { "model_numbers": [ "6GK5216-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)", "product_id": "CSAFPID-000246", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)", "product_id": "CSAFPID-000247", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)", "product_id": "CSAFPID-000248", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)", "product_id": "CSAFPID-000249", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)", "product_id": "CSAFPID-000250", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)", "product_id": "CSAFPID-000251", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)", "product_id": "CSAFPID-000252", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)", "product_id": "CSAFPID-000253", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)", "product_id": "CSAFPID-000254", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)", "product_id": "CSAFPID-000255", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)", "product_id": "CSAFPID-000256", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)", "product_id": "CSAFPID-000257", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)", "product_id": "CSAFPID-000258", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)", "product_id": "CSAFPID-000259", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)", "product_id": "CSAFPID-000260", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)", "product_id": "CSAFPID-000261", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)", "product_id": "CSAFPID-000262", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)", "product_id": "CSAFPID-000263", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)", "product_id": "CSAFPID-000264", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)", "product_id": "CSAFPID-000265", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)", "product_id": "CSAFPID-000266", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)", "product_id": "CSAFPID-000267", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)", "product_id": "CSAFPID-000268", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)", "product_id": "CSAFPID-000269", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)", "product_id": "CSAFPID-000270", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)", "product_id": "CSAFPID-000271", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)", "product_id": "CSAFPID-000272", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)", "product_id": "CSAFPID-000273", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)", "product_id": "CSAFPID-000274", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)", "product_id": "CSAFPID-000275", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)", "product_id": "CSAFPID-000276", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)", "product_id": "CSAFPID-000277", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)", "product_id": "CSAFPID-000278", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)", "product_id": "CSAFPID-000279", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)", "product_id": "CSAFPID-000280", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)", "product_id": "CSAFPID-000281", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)", "product_id": "CSAFPID-000282", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)", "product_id": "CSAFPID-000283", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)", "product_id": "CSAFPID-000284", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)", "product_id": "CSAFPID-000285", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)", "product_id": "CSAFPID-000286", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)", "product_id": "CSAFPID-000287", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)", "product_id": "CSAFPID-000288", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)", "product_id": "CSAFPID-000289", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)", "product_id": "CSAFPID-000290", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)", "product_id": "CSAFPID-000291", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)", "product_id": "CSAFPID-000292", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)", "product_id": "CSAFPID-000293", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)", "product_id": "CSAFPID-000294", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)", "product_id": "CSAFPID-000295", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)", "product_id": "CSAFPID-000296", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)", "product_id": "CSAFPID-000297", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)", "product_id": "CSAFPID-000298", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)", "product_id": "CSAFPID-000299", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)", "product_id": "CSAFPID-000300", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)", "product_id": "CSAFPID-000301", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)", "product_id": "CSAFPID-000302", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)", "product_id": "CSAFPID-000303", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)", "product_id": "CSAFPID-000304", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)", "product_id": "CSAFPID-000305", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)", "product_id": "CSAFPID-000306", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Security Configuration Tool (SCT)", "product_id": "CSAFPID-000307" } } ], "category": "product_name", "name": "Security Configuration Tool (SCT)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)", "product_id": "CSAFPID-000308", "product_identification_helper": { "model_numbers": [ "6GK1411-1AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)", "product_id": "CSAFPID-000309", "product_identification_helper": { "model_numbers": [ "6GK1411-5AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)", "product_id": "CSAFPID-000310", "product_identification_helper": { "model_numbers": [ "6GK7242-7KX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)", "product_id": "CSAFPID-000311", "product_identification_helper": { "model_numbers": [ "6GK7243-1BX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)", "product_id": "CSAFPID-000312", "product_identification_helper": { "model_numbers": [ "6GK7243-7KX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)", "product_id": "CSAFPID-000313", "product_identification_helper": { "model_numbers": [ "6GK7243-7SX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)", "product_id": "CSAFPID-000314", "product_identification_helper": { "model_numbers": [ "6GK7243-8RX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "CSAFPID-000315", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)", "product_id": "CSAFPID-000316", "product_identification_helper": { "model_numbers": [ "6GK7543-1AX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "CSAFPID-000317", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)", "product_id": "CSAFPID-000318", "product_identification_helper": { "model_numbers": [ "6GK7545-1GX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1626 (6GK1162-6AA01)", "product_id": "CSAFPID-000319", "product_identification_helper": { "model_numbers": [ "6GK1162-6AA01" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1626 (6GK1162-6AA01)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1628 (6GK1162-8AA00)", "product_id": "CSAFPID-000320", "product_identification_helper": { "model_numbers": [ "6GK1162-8AA00" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1628 (6GK1162-8AA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)", "product_id": "CSAFPID-000321", "product_identification_helper": { "model_numbers": [ "6GK7343-1GX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)", "product_id": "CSAFPID-000322", "product_identification_helper": { "model_numbers": [ "6GK7443-1GX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "CSAFPID-000323", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.0.1", "product": { "name": "SIMATIC Drive Controller family", "product_id": "CSAFPID-000324" } } ], "category": "product_name", "name": "SIMATIC Drive Controller family" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC ET 200SP Open Controller (incl. SIPLUS variants)", "product_id": "CSAFPID-000325" } } ], "category": "product_name", "name": "SIMATIC ET 200SP Open Controller (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV18", "product": { "name": "SIMATIC HMI Unified Comfort Panels", "product_id": "CSAFPID-000326" } } ], "category": "product_name", "name": "SIMATIC HMI Unified Comfort Panels" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV540 H (6GF3540-0GE10)", "product_id": "CSAFPID-000327", "product_identification_helper": { "model_numbers": [ "6GF3540-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 H (6GF3540-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV540 S (6GF3540-0CD10)", "product_id": "CSAFPID-000328", "product_identification_helper": { "model_numbers": [ "6GF3540-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 S (6GF3540-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV550 H (6GF3550-0GE10)", "product_id": "CSAFPID-000329", "product_identification_helper": { "model_numbers": [ "6GF3550-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 H (6GF3550-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV550 S (6GF3550-0CD10)", "product_id": "CSAFPID-000330", "product_identification_helper": { "model_numbers": [ "6GF3550-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 S (6GF3550-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV560 U (6GF3560-0LE10)", "product_id": "CSAFPID-000331", "product_identification_helper": { "model_numbers": [ "6GF3560-0LE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 U (6GF3560-0LE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIMATIC MV560 X (6GF3560-0HE10)", "product_id": "CSAFPID-000332", "product_identification_helper": { "model_numbers": [ "6GF3560-0HE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 X (6GF3560-0HE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V14", "product_id": "CSAFPID-000333" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V14" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V15", "product_id": "CSAFPID-000334" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V15" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V16 Update 6", "product": { "name": "SIMATIC NET PC Software V16", "product_id": "CSAFPID-000335" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V16" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V17", "product_id": "CSAFPID-000336" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V17" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC PCS 7 TeleControl", "product_id": "CSAFPID-000337" } } ], "category": "product_name", "name": "SIMATIC PCS 7 TeleControl" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0", "product": { "name": "SIMATIC PCS neo (Administration Console)", "product_id": "CSAFPID-000338" } } ], "category": "product_name", "name": "SIMATIC PCS neo (Administration Console)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV9.2.2", "product": { "name": "SIMATIC PDM", "product_id": "CSAFPID-000339" } } ], "category": "product_name", "name": "SIMATIC PDM" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2020 SP1 Update 1", "product": { "name": "SIMATIC Process Historian OPC UA Server", "product_id": "CSAFPID-000340" } } ], "category": "product_name", "name": "SIMATIC Process Historian OPC UA Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF166C (6GT2002-0EE20)", "product_id": "CSAFPID-000341", "product_identification_helper": { "model_numbers": [ "6GT2002-0EE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF166C (6GT2002-0EE20)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF185C (6GT2002-0JE10)", "product_id": "CSAFPID-000342", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE10" ] } } } ], "category": "product_name", "name": "SIMATIC RF185C (6GT2002-0JE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF186C (6GT2002-0JE20)", "product_id": "CSAFPID-000343", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF186C (6GT2002-0JE20)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF186CI (6GT2002-0JE50)", "product_id": "CSAFPID-000344", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE50" ] } } } ], "category": "product_name", "name": "SIMATIC RF186CI (6GT2002-0JE50)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF188C (6GT2002-0JE40)", "product_id": "CSAFPID-000345", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE40" ] } } } ], "category": "product_name", "name": "SIMATIC RF188C (6GT2002-0JE40)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF188CI (6GT2002-0JE60)", "product_id": "CSAFPID-000346", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE60" ] } } } ], "category": "product_name", "name": "SIMATIC RF188CI (6GT2002-0JE60)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.0.1", "product": { "name": "SIMATIC RF360R (6GT2801-5BA30)", "product_id": "CSAFPID-000347", "product_identification_helper": { "model_numbers": [ "6GT2801-5BA30" ] } } } ], "category": "product_name", "name": "SIMATIC RF360R (6GT2801-5BA30)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF610R (6GT2811-6BC10)", "product_id": "CSAFPID-000348", "product_identification_helper": { "model_numbers": [ "6GT2811-6BC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF610R (6GT2811-6BC10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF615R (6GT2811-6CC10)", "product_id": "CSAFPID-000349", "product_identification_helper": { "model_numbers": [ "6GT2811-6CC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF615R (6GT2811-6CC10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF650R (6GT2811-6AB20)", "product_id": "CSAFPID-000350", "product_identification_helper": { "model_numbers": [ "6GT2811-6AB20" ] } } } ], "category": "product_name", "name": "SIMATIC RF650R (6GT2811-6AB20)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF680R (6GT2811-6AA10)", "product_id": "CSAFPID-000351", "product_identification_helper": { "model_numbers": [ "6GT2811-6AA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF680R (6GT2811-6AA10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.1", "product": { "name": "SIMATIC RF685R (6GT2811-6CA10)", "product_id": "CSAFPID-000352", "product_identification_helper": { "model_numbers": [ "6GT2811-6CA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF685R (6GT2811-6CA10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.6.0", "product": { "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "product_id": "CSAFPID-000353" } } ], "category": "product_name", "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", "product_id": "CSAFPID-000354" } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV30.0", "product": { "name": "SIMATIC S7-1500 Software Controller", "product_id": "CSAFPID-000355" } } ], "category": "product_name", "name": "SIMATIC S7-1500 Software Controller" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.0", "product": { "name": "SIMATIC S7-PLCSIM Advanced", "product_id": "CSAFPID-000356" } } ], "category": "product_name", "name": "SIMATIC S7-PLCSIM Advanced" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC STEP 7 (TIA Portal)", "product_id": "CSAFPID-000357" } } ], "category": "product_name", "name": "SIMATIC STEP 7 (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.7 HF4", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "CSAFPID-000358" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV8.0", "product": { "name": "SIMATIC WinCC", "product_id": "CSAFPID-000359" } } ], "category": "product_name", "name": "SIMATIC WinCC" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 Update 5", "product": { "name": "SIMATIC WinCC Unified (TIA Portal)", "product_id": "CSAFPID-000360" } } ], "category": "product_name", "name": "SIMATIC WinCC Unified (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT Software ST7sc", "product_id": "CSAFPID-000361" } } ], "category": "product_name", "name": "SINAUT Software ST7sc" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT ST7CC", "product_id": "CSAFPID-000362" } } ], "category": "product_name", "name": "SINAUT ST7CC" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP2", "product": { "name": "SINEC INS", "product_id": "CSAFPID-000363" } } ], "category": "product_name", "name": "SINEC INS" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV1.0.3", "product": { "name": "SINEC NMS", "product_id": "CSAFPID-000364" } } ], "category": "product_name", "name": "SINEC NMS" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.1", "product": { "name": "SINEMA Remote Connect Server", "product_id": "CSAFPID-000365" } } ], "category": "product_name", "name": "SINEMA Remote Connect Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "CSAFPID-000366", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "CSAFPID-000367", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)", "product_id": "CSAFPID-000368", "product_identification_helper": { "model_numbers": [ "6AG1242-7KX31-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)", "product_id": "CSAFPID-000369", "product_identification_helper": { "model_numbers": [ "6AG1543-1AX00-2XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)", "product_id": "CSAFPID-000370", "product_identification_helper": { "model_numbers": [ "6AG1343-1GX31-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.3", "product": { "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)", "product_id": "CSAFPID-000371", "product_identification_helper": { "model_numbers": [ "6AG1443-1GX30-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.5.2", "product": { "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)", "product_id": "CSAFPID-000372", "product_identification_helper": { "model_numbers": [ "6AG1202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)", "product_id": "CSAFPID-000373", "product_identification_helper": { "model_numbers": [ "6AG1308-2FL10-4AA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)", "product_id": "CSAFPID-000374", "product_identification_helper": { "model_numbers": [ "6AG1206-2BB00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)", "product_id": "CSAFPID-000375", "product_identification_helper": { "model_numbers": [ "6AG1206-2BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)", "product_id": "CSAFPID-000376", "product_identification_helper": { "model_numbers": [ "6AG1208-0BA00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)", "product_id": "CSAFPID-000377", "product_identification_helper": { "model_numbers": [ "6AG1216-4BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)", "product_id": "CSAFPID-000378", "product_identification_helper": { "model_numbers": [ "6AG1243-1BX30-2AX0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)", "product_id": "CSAFPID-000379", "product_identification_helper": { "model_numbers": [ "6AG2243-1BX30-1XE0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.6", "product": { "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)", "product_id": "CSAFPID-000380", "product_identification_helper": { "model_numbers": [ "6AG1543-1MX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV3.1.1", "product": { "name": "TeleControl Server Basic V3", "product_id": "CSAFPID-000381" } } ], "category": "product_name", "name": "TeleControl Server Basic V3" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP8", "product": { "name": "TIA Administrator", "product_id": "CSAFPID-000382" } } ], "category": "product_name", "name": "TIA Administrator" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV2.3.6", "product": { "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)", "product_id": "CSAFPID-000383", "product_identification_helper": { "model_numbers": [ "6GK7543-1MX00-0XE0" ] } } } ], "category": "product_name", "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V15", "product_id": "CSAFPID-000384" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V15" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V16", "product_id": "CSAFPID-000385" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V16" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV17 Update 5", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V17", "product_id": "CSAFPID-000386" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V17" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. (https://www.openssl.org/news/secadv/20220315.txt). CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108", "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000222", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000225", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306", "CSAFPID-000307", "CSAFPID-000308", "CSAFPID-000309", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000315", "CSAFPID-000316", "CSAFPID-000317", "CSAFPID-000318", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000322", "CSAFPID-000323", "CSAFPID-000324", "CSAFPID-000325", "CSAFPID-000326", "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000335", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000338", "CSAFPID-000339", "CSAFPID-000340", "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346", "CSAFPID-000347", "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352", "CSAFPID-000353", "CSAFPID-000354", "CSAFPID-000355", "CSAFPID-000356", "CSAFPID-000357", "CSAFPID-000358", "CSAFPID-000359", "CSAFPID-000360", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000363", "CSAFPID-000364", "CSAFPID-000365", "CSAFPID-000366", "CSAFPID-000367", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000370", "CSAFPID-000371", "CSAFPID-000372", "CSAFPID-000373", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377", "CSAFPID-000378", "CSAFPID-000379", "CSAFPID-000380", "CSAFPID-000381", "CSAFPID-000382", "CSAFPID-000383", "CSAFPID-000384", "CSAFPID-000385", "CSAFPID-000386" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000222", "CSAFPID-000225", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000307", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000323", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000370", "CSAFPID-000373", "CSAFPID-000384", "CSAFPID-000385" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000316", "CSAFPID-000318", "CSAFPID-000325", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000357", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000378", "CSAFPID-000379" ] }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "CSAFPID-000386" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109784441/" }, { "category": "vendor_fix", "details": "Update to V2.2.28 or later version", "product_ids": [ "CSAFPID-000315", "CSAFPID-000317", "CSAFPID-000366", "CSAFPID-000367" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817067/" }, { "category": "vendor_fix", "details": "Update to V2.3.6 or later version", "product_ids": [ "CSAFPID-000380", "CSAFPID-000383" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817397/" }, { "category": "vendor_fix", "details": "Update to V3.1.1 or later version", "product_ids": [ "CSAFPID-000381" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812231/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "CSAFPID-000322", "CSAFPID-000371" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/" }, { "category": "vendor_fix", "details": "Update to V30.0 or later version", "product_ids": [ "CSAFPID-000355" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478528/" }, { "category": "vendor_fix", "details": "Update to V4.4 or later version", "product_ids": [ "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817768/" }, { "category": "vendor_fix", "details": "Update to V5.5.2 or later version", "product_ids": [ "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000372" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817790/" }, { "category": "vendor_fix", "details": "Update to V7.2 or later version", "product_ids": [ "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817007/" }, { "category": "vendor_fix", "details": "Update to V8.0 or later version", "product_ids": [ "CSAFPID-000359" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109816599/" }, { "category": "vendor_fix", "details": "Update to V1.0.3 or later version", "product_ids": [ "CSAFPID-000364" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/" }, { "category": "vendor_fix", "details": "Update to V2.15.1 or later version", "product_ids": [ "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Use the Edge Management System to update to V1.7 or later version", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.siemens.com/industrial-edge-marketplace/" }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-00018" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "CSAFPID-000365" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811169/" }, { "category": "vendor_fix", "details": "Update to V1.6 Upd6 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109805072/" }, { "category": "vendor_fix", "details": "Update to V9.2.2 or later version", "product_ids": [ "CSAFPID-000339" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811911/" }, { "category": "vendor_fix", "details": "Update to V4.0 or later version", "product_ids": [ "CSAFPID-000338" ], "url": "https://support.industry.siemens.com/cs/ww/de/view/109814551/" }, { "category": "vendor_fix", "details": "Update to V1.9 or later version", "product_ids": [ "CSAFPID-000308", "CSAFPID-000309" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812235/" }, { "category": "vendor_fix", "details": "Update ROX II to V2.15.1 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Update to V3.0.1 or later version", "product_ids": [ "CSAFPID-000354" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version", "product_ids": [ "CSAFPID-000356" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809300/" }, { "category": "vendor_fix", "details": "Update to V4.6.0 or later version", "product_ids": [ "CSAFPID-000353" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814248/" }, { "category": "vendor_fix", "details": "Update to V2.3.1 or later version", "product_ids": [ "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810992/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811878/" }, { "category": "vendor_fix", "details": "Update to V4.0.1 or later version", "product_ids": [ "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811014/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "CSAFPID-000347" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811118/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811120/" }, { "category": "vendor_fix", "details": "Update ot V1.0 SP2 or later version", "product_ids": [ "CSAFPID-000363" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812610/" }, { "category": "vendor_fix", "details": "Update to V1.0 SP8 or later version", "product_ids": [ "CSAFPID-000382" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/114358/" }, { "category": "vendor_fix", "details": "Update to V5.7 HF4 or later version", "product_ids": [ "CSAFPID-000358" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811212/" }, { "category": "vendor_fix", "details": "Update to V16 Update 6 or later version", "product_ids": [ "CSAFPID-000335" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811815/" }, { "category": "vendor_fix", "details": "Update to V6.5 or later version", "product_ids": [ "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809635/" }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "CSAFPID-000360" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109792171/" }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/" }, { "category": "vendor_fix", "details": "Update to V2020 SP1 Update 1 or later version\nIn the context of SIMATIC PCS neo, update to SIMATIC PCS neo V4.0 or later version (\u003chttps://support.industry.siemens.com/cs/ww/de/view/109814551/\u003e); in the context of SIMATIC PCS 7, update to SIMATIC PCS 7 V9.1 SP2 or later version (\u003chttps://support.industry.siemens.com/cs/ww/en/view/109812240/\u003e); in the context of SIMATIC WinCC, contact local support", "product_ids": [ "CSAFPID-000340" ] }, { "category": "vendor_fix", "details": "Update to V3.0.1 or later version", "product_ids": [ "CSAFPID-000324" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109773914/" }, { "category": "vendor_fix", "details": "Update to V18 or later version", "product_ids": [ "CSAFPID-000326" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109746530/" }, { "category": "vendor_fix", "details": "Update to V8.7.1.11 or later version", "product_ids": [ "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109816886/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108", "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000222", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000225", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306", "CSAFPID-000307", "CSAFPID-000308", "CSAFPID-000309", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000315", "CSAFPID-000316", "CSAFPID-000317", "CSAFPID-000318", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000322", "CSAFPID-000323", "CSAFPID-000324", "CSAFPID-000325", "CSAFPID-000326", "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000335", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000338", "CSAFPID-000339", "CSAFPID-000340", "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346", "CSAFPID-000347", "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352", "CSAFPID-000353", "CSAFPID-000354", "CSAFPID-000355", "CSAFPID-000356", "CSAFPID-000357", "CSAFPID-000358", "CSAFPID-000359", "CSAFPID-000360", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000363", "CSAFPID-000364", "CSAFPID-000365", "CSAFPID-000366", "CSAFPID-000367", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000370", "CSAFPID-000371", "CSAFPID-000372", "CSAFPID-000373", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377", "CSAFPID-000378", "CSAFPID-000379", "CSAFPID-000380", "CSAFPID-000381", "CSAFPID-000382", "CSAFPID-000383", "CSAFPID-000384", "CSAFPID-000385", "CSAFPID-000386" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027", "CSAFPID-00028", "CSAFPID-00029", "CSAFPID-00030", "CSAFPID-00031", "CSAFPID-00032", "CSAFPID-00033", "CSAFPID-00034", "CSAFPID-00035", "CSAFPID-00036", "CSAFPID-00037", "CSAFPID-00038", "CSAFPID-00039", "CSAFPID-00040", "CSAFPID-00041", "CSAFPID-00043", "CSAFPID-00042", "CSAFPID-00044", "CSAFPID-00045", "CSAFPID-00046", "CSAFPID-00047", "CSAFPID-00048", "CSAFPID-00049", "CSAFPID-00050", "CSAFPID-00051", "CSAFPID-00052", "CSAFPID-00053", "CSAFPID-00054", "CSAFPID-00055", "CSAFPID-00056", "CSAFPID-00058", "CSAFPID-00057", "CSAFPID-00059", "CSAFPID-00060", "CSAFPID-00061", "CSAFPID-00062", "CSAFPID-00063", "CSAFPID-00064", "CSAFPID-00065", "CSAFPID-00066", "CSAFPID-00067", "CSAFPID-00068", "CSAFPID-00069", "CSAFPID-00070", "CSAFPID-00073", "CSAFPID-00071", "CSAFPID-00072", "CSAFPID-00074", "CSAFPID-00075", "CSAFPID-00076", "CSAFPID-00077", "CSAFPID-00078", "CSAFPID-00079", "CSAFPID-00080", "CSAFPID-00081", "CSAFPID-00082", "CSAFPID-00083", "CSAFPID-00084", "CSAFPID-00085", "CSAFPID-00086", "CSAFPID-00087", "CSAFPID-00088", "CSAFPID-00089", "CSAFPID-00090", "CSAFPID-00091", "CSAFPID-00092", "CSAFPID-00093", "CSAFPID-00094", "CSAFPID-00095", "CSAFPID-00096", "CSAFPID-00097", "CSAFPID-00098", "CSAFPID-00099", "CSAFPID-000100", "CSAFPID-000101", "CSAFPID-000102", "CSAFPID-000103", "CSAFPID-000104", "CSAFPID-000106", "CSAFPID-000105", "CSAFPID-000107", "CSAFPID-000108", "CSAFPID-000109", "CSAFPID-000110", "CSAFPID-000111", "CSAFPID-000112", "CSAFPID-000113", "CSAFPID-000114", "CSAFPID-000115", "CSAFPID-000116", "CSAFPID-000117", "CSAFPID-000118", "CSAFPID-000119", "CSAFPID-000120", "CSAFPID-000121", "CSAFPID-000122", "CSAFPID-000123", "CSAFPID-000124", "CSAFPID-000125", "CSAFPID-000126", "CSAFPID-000127", "CSAFPID-000128", "CSAFPID-000129", "CSAFPID-000130", "CSAFPID-000131", "CSAFPID-000132", "CSAFPID-000133", "CSAFPID-000134", "CSAFPID-000135", "CSAFPID-000136", "CSAFPID-000137", "CSAFPID-000138", "CSAFPID-000139", "CSAFPID-000140", "CSAFPID-000141", "CSAFPID-000142", "CSAFPID-000143", "CSAFPID-000144", "CSAFPID-000145", "CSAFPID-000146", "CSAFPID-000147", "CSAFPID-000148", "CSAFPID-000149", "CSAFPID-000150", "CSAFPID-000151", "CSAFPID-000152", "CSAFPID-000153", "CSAFPID-000154", "CSAFPID-000155", "CSAFPID-000156", "CSAFPID-000157", "CSAFPID-000158", "CSAFPID-000159", "CSAFPID-000160", "CSAFPID-000161", "CSAFPID-000162", "CSAFPID-000163", "CSAFPID-000164", "CSAFPID-000165", "CSAFPID-000166", "CSAFPID-000167", "CSAFPID-000168", "CSAFPID-000169", "CSAFPID-000170", "CSAFPID-000171", "CSAFPID-000172", "CSAFPID-000173", "CSAFPID-000174", "CSAFPID-000175", "CSAFPID-000177", "CSAFPID-000176", "CSAFPID-000178", "CSAFPID-000179", "CSAFPID-000180", "CSAFPID-000181", "CSAFPID-000182", "CSAFPID-000183", "CSAFPID-000184", "CSAFPID-000185", "CSAFPID-000186", "CSAFPID-000187", "CSAFPID-000188", "CSAFPID-000189", "CSAFPID-000190", "CSAFPID-000191", "CSAFPID-000192", "CSAFPID-000193", "CSAFPID-000194", "CSAFPID-000195", "CSAFPID-000196", "CSAFPID-000197", "CSAFPID-000198", "CSAFPID-000199", "CSAFPID-000200", "CSAFPID-000201", "CSAFPID-000202", "CSAFPID-000203", "CSAFPID-000204", "CSAFPID-000205", "CSAFPID-000206", "CSAFPID-000207", "CSAFPID-000208", "CSAFPID-000209", "CSAFPID-000210", "CSAFPID-000211", "CSAFPID-000212", "CSAFPID-000213", "CSAFPID-000214", "CSAFPID-000215", "CSAFPID-000216", "CSAFPID-000217", "CSAFPID-000218", "CSAFPID-000219", "CSAFPID-000220", "CSAFPID-000221", "CSAFPID-000222", "CSAFPID-000223", "CSAFPID-000224", "CSAFPID-000225", "CSAFPID-000226", "CSAFPID-000227", "CSAFPID-000228", "CSAFPID-000229", "CSAFPID-000230", "CSAFPID-000231", "CSAFPID-000232", "CSAFPID-000233", "CSAFPID-000234", "CSAFPID-000235", "CSAFPID-000236", "CSAFPID-000237", "CSAFPID-000238", "CSAFPID-000239", "CSAFPID-000240", "CSAFPID-000241", "CSAFPID-000242", "CSAFPID-000243", "CSAFPID-000244", "CSAFPID-000245", "CSAFPID-000246", "CSAFPID-000247", "CSAFPID-000248", "CSAFPID-000249", "CSAFPID-000250", "CSAFPID-000251", "CSAFPID-000252", "CSAFPID-000253", "CSAFPID-000254", "CSAFPID-000255", "CSAFPID-000256", "CSAFPID-000257", "CSAFPID-000258", "CSAFPID-000259", "CSAFPID-000260", "CSAFPID-000261", "CSAFPID-000262", "CSAFPID-000263", "CSAFPID-000264", "CSAFPID-000265", "CSAFPID-000266", "CSAFPID-000267", "CSAFPID-000268", "CSAFPID-000269", "CSAFPID-000270", "CSAFPID-000271", "CSAFPID-000272", "CSAFPID-000273", "CSAFPID-000274", "CSAFPID-000275", "CSAFPID-000276", "CSAFPID-000277", "CSAFPID-000278", "CSAFPID-000279", "CSAFPID-000280", "CSAFPID-000281", "CSAFPID-000282", "CSAFPID-000283", "CSAFPID-000284", "CSAFPID-000285", "CSAFPID-000286", "CSAFPID-000287", "CSAFPID-000288", "CSAFPID-000289", "CSAFPID-000290", "CSAFPID-000291", "CSAFPID-000292", "CSAFPID-000293", "CSAFPID-000294", "CSAFPID-000295", "CSAFPID-000296", "CSAFPID-000297", "CSAFPID-000298", "CSAFPID-000299", "CSAFPID-000300", "CSAFPID-000301", "CSAFPID-000302", "CSAFPID-000303", "CSAFPID-000304", "CSAFPID-000305", "CSAFPID-000306", "CSAFPID-000307", "CSAFPID-000308", "CSAFPID-000309", "CSAFPID-000310", "CSAFPID-000311", "CSAFPID-000312", "CSAFPID-000313", "CSAFPID-000314", "CSAFPID-000315", "CSAFPID-000316", "CSAFPID-000317", "CSAFPID-000318", "CSAFPID-000319", "CSAFPID-000320", "CSAFPID-000321", "CSAFPID-000322", "CSAFPID-000323", "CSAFPID-000324", "CSAFPID-000325", "CSAFPID-000326", "CSAFPID-000327", "CSAFPID-000328", "CSAFPID-000329", "CSAFPID-000330", "CSAFPID-000331", "CSAFPID-000332", "CSAFPID-000333", "CSAFPID-000334", "CSAFPID-000335", "CSAFPID-000336", "CSAFPID-000337", "CSAFPID-000338", "CSAFPID-000339", "CSAFPID-000340", "CSAFPID-000341", "CSAFPID-000342", "CSAFPID-000343", "CSAFPID-000344", "CSAFPID-000345", "CSAFPID-000346", "CSAFPID-000347", "CSAFPID-000348", "CSAFPID-000349", "CSAFPID-000350", "CSAFPID-000351", "CSAFPID-000352", "CSAFPID-000353", "CSAFPID-000354", "CSAFPID-000355", "CSAFPID-000356", "CSAFPID-000357", "CSAFPID-000358", "CSAFPID-000359", "CSAFPID-000360", "CSAFPID-000361", "CSAFPID-000362", "CSAFPID-000363", "CSAFPID-000364", "CSAFPID-000365", "CSAFPID-000366", "CSAFPID-000367", "CSAFPID-000368", "CSAFPID-000369", "CSAFPID-000370", "CSAFPID-000371", "CSAFPID-000372", "CSAFPID-000373", "CSAFPID-000374", "CSAFPID-000375", "CSAFPID-000376", "CSAFPID-000377", "CSAFPID-000378", "CSAFPID-000379", "CSAFPID-000380", "CSAFPID-000381", "CSAFPID-000382", "CSAFPID-000383", "CSAFPID-000384", "CSAFPID-000385", "CSAFPID-000386" ] } ], "title": "CVE-2022-0778" } ] }
ICSA-22-221-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Mitsubishi Electric", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could create a denial-of-service condition or enable arbitrary code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-221-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-221-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-221-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-221-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-221-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Mitsubishi Electric Multiple Factory Automation Products (Update B)", "tracking": { "current_release_date": "2023-02-02T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-221-01", "initial_release_date": "2022-08-30T00:00:00.000000Z", "revision_history": [ { "date": "2022-08-30T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update C)" }, { "date": "2022-11-01T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update A)" }, { "date": "2022-11-02T00:00:00.000000Z", "legacy_version": "B", "number": "3", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update B)" }, { "date": "2023-02-02T00:00:00.000000Z", "legacy_version": "C", "number": "4", "summary": "Mitsubishi Electric Multiple Factory Automation Products (Update C)" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 03", "product": { "name": "CC-Link IE TSN Industrial Managed Switch (NZ2MHG-TSNT8F2 NZ2MHG-TSNT4): Version 03 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CC-Link IE TSN Industrial Managed Switch (NZ2MHG-TSNT8F2 NZ2MHG-TSNT4)" }, { "branches": [ { "category": "product_version", "name": "1.275M", "product": { "name": "GOT2000 compatible HMI software (GT SoftGOT2000): Version 1.275M", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "GOT2000 compatible HMI software (GT SoftGOT2000)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 08", "product": { "name": "MELSEC iQ-R Series OPC UA Server Module (RD81OPC96): Version 08 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "MELSEC iQ-R Series OPC UA Server Module (RD81OPC96)" } ], "category": "vendor", "name": "Mitsubishi Electric" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in OpenSSL creates the potential for an infinite loop in the affected product, which could lead to a denial-of-service condition. CVE-2022-0778 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "GOT2000 compatible HMI software: Mitsubishi Electric has released a patch for these issues and recommends users update affected products to Version 1.280S or later. Users should contact Mitsubishi Electric to obtain the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric has released fixed firmware for these issues and recommends users update affected products to Version 04 or later. Users should contact Mitsubishi Electric to obtain the fixed firmware version. To update affected CC-Link IE TSN Industrial Managed Switch products log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "To update affected CC-Link IE TSN Industrial Managed Switch products, log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric recommends users to log into NZ2MHG-TSNT8F2 or NZ2MHG-TSNT4 with the web interface and change the username and password from their default setting in [Account Management] on the function menu. They are also recommended to set proper access permissions for different users.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "MELSEC iQ-R Series OPC UA Server Module: Mitsubishi Electric will release fixed software for this device in the near future. Mitsubishi Electric recommends users ensure the OPC UA Client is updated to the latest version and to use legitimate certificates on the OPC UA Client side.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For instructions on how to check the product version and more information regarding contacting Mitsubishi Electric, refer to Mitsubishi Electric\u0027s security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-009_en.pdf" }, { "category": "mitigation", "details": "When internet access is required, use a virtual private network (VPN) to prevent unauthorized access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Use the products within a LAN and block access from untrusted networks and hosts.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Update the OPC UA server to the latest version available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Install antivirus software on computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Restrict physical access to computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2022-1292", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in OpenSSL creates the potential for OS command injection in the affected product, which could lead to arbitrary code execution. CVE-2022-1292 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "GOT2000 compatible HMI software: Mitsubishi Electric has released a patch for these issues and recommends users update affected products to Version 1.280S or later. Users should contact Mitsubishi Electric to obtain the patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric has released fixed firmware for these issues and recommends users update affected products to Version 04 or later. Users should contact Mitsubishi Electric to obtain the fixed firmware version. To update affected CC-Link IE TSN Industrial Managed Switch products log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "To update affected CC-Link IE TSN Industrial Managed Switch products, log into the product with the web interface and go to [System] \u2192 [System Management] \u2192 [Firmware Upgrade] from the Function menu after obtaining the updated firmware file.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "CC-Link IE TSN Industrial Managed Switch: Mitsubishi Electric recommends users to log into NZ2MHG-TSNT8F2 or NZ2MHG-TSNT4 with the web interface and change the username and password from their default setting in [Account Management] on the function menu. They are also recommended to set proper access permissions for different users.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "MELSEC iQ-R Series OPC UA Server Module: Mitsubishi Electric will release fixed software for this device in the near future. Mitsubishi Electric recommends users ensure the OPC UA Client is updated to the latest version and to use legitimate certificates on the OPC UA Client side.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For instructions on how to check the product version and more information regarding contacting Mitsubishi Electric, refer to Mitsubishi Electric\u0027s security advisory.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-009_en.pdf" }, { "category": "mitigation", "details": "When internet access is required, use a virtual private network (VPN) to prevent unauthorized access.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Use the products within a LAN and block access from untrusted networks and hosts.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Update the OPC UA server to the latest version available.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For GOT2000 compatible HMI software: Install antivirus software on computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Restrict physical access to computers running the affected software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
icsa-23-143-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to crash the device being accessed or cause a denial-of-service condition. ", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-143-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-143-02.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-23-143-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi Energy\u0027s RTU500 Series Product (UPDATE B)", "tracking": { "current_release_date": "2023-10-19T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-143-02", "initial_release_date": "2023-05-05T06:00:00.000000Z", "revision_history": [ { "date": "2023-05-05T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2023-09-28T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Update A - Update to Mitigations and Affected Products" }, { "date": "2023-10-19T06:00:00.000000Z", "legacy_version": "Update B", "number": "3", "summary": "Update B - Update to Mitigations and Affected Products" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=12.0.1|\u003c=12.0.15", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.0.1|\u003c=12.0.15", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.2.1|\u003c=12.2.12", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.2.1|\u003c=12.2.12", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.4.1|\u003c=12.4.12", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.4.1|\u003c=12.4.12", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.6.1|\u003c=12.6.9", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.6.1|\u003c=12.6.9", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.7.1|\u003c=12.7.6", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.7.1|\u003c=12.7.6", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.2.1|\u003c=13.2.6", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.2.1|\u003c=13.2.6", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.3.1|\u003c=13.3.3", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.3.1|\u003c=13.3.3", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.4.1|\u003c=13.4.2", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.4.1|\u003c=13.4.2", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "There is a type-confusion vulnerability affecting X.400 address processing within an X.509 GeneralName. This vulnerability could allow an attacker to pass arbitrary pointers to a memcmp call, enabling access to read memory contents or cause a denial-of-service condition.X.400 addresses parsed as an ASN1_STRING while the public structure definition for GENERAL_NAME incorrectly specifies the x400Address field type as ASN1_TYPE.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0286" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Until the updates are made available, Hitachi Energy recommends the following general mitigation factors/workarounds for the products with RTU500 series CMU Firmware versions 12.0.1 \ufffd 12.0.15, 12.2.1 \ufffd 12.2.12, 12.4.1 \ufffd 12.4.12, 12.6.1 \ufffd 12.6.9, 12.7.1 \ufffd 12.7.6, 13.2.1 \ufffd 13.2.6, 13.3.1 \ufffd 13.3.3, 13.4.2 to address the vulnerabilities CVE-2023-0286 and CVE-2022-4304:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing-based side channel exists in the OpenSSL RSA Decryption implementation. This could allow an attacker sufficient access to recover plaintext across a network to perform a Bleichenbacher style attack. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Until the updates are made available, Hitachi Energy recommends the following general mitigation factors/workarounds for the products with RTU500 series CMU Firmware versions 12.0.1 - 12.0.15, 12.2.1 - 12.2.12, 12.4.1 - 12.4.12, 12.6.1 - 12.6.9, 12.7.1 - 12.7.6, 13.2.1 - 13.2.6, 13.3.1 - 13.3.3, 13.4.2 to address the vulnerabilities CVE-2023-0286 and CVE-2022-4304:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-23937", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the Wind River VxWorks version 6.9 affecting the RTU500 series product versions listed. An attacker could exploit the vulnerability by using a specific crafted packet that could lead to an out-of-bounds read during an IKE initial exchange scenario. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23937" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 \ufffd 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 \ufffd 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 \ufffd 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 \ufffd 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 \ufffd 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 \ufffd 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 \ufffd 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL version 1.0.2 that affects the RTU500 Series product versions listed. An attacker can exploit the BN_mod_sqrt() function to compute a modular square root that contains a bug causing a continual loop for non-prime moduli. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 \ufffd 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 \ufffd 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 \ufffd 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 \ufffd 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 \ufffd 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 \ufffd 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 \ufffd 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL Version 1.0.2 affecting the RTU500 Series product versions listed. An attacker with access to applications and the capability to present SM2 content for decryption could cause a buffer overflow up to a maximum of 62 bytes while altering contents of data present after the buffer. This vulnerability could allow an attacker to change application behavior or cause the application to crash.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3711" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL Version 1.0.2 affecting the RTU500 Series product versions listed. A malicious actor could cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions. Exploiting this vulnerability could create a system crash causing a denial-of-service condition or a disclosure of private memory contents, such as private keys or sensitive plaintext. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3712" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
ICSA-24-046-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIDIS Prime before V4.0.400 is affected by multiple vulnerabilities in the components OPC UA and OpenSSL, that could allow an unauthenticated attacker with access to the network where SIDIS Prime is installed to reuse OPC UA client credentials, create a denial of service condition of the SIDIS Prime OPC UA client, or create a denial of service condition of the SIDIS Prime TLS service.\n\nSiemens has released a new version of SIDIS Prime and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-108696.json" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-108696.html" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-108696.pdf" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-108696.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-24-046-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-046-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-046-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIDIS Prime", "tracking": { "current_release_date": "2024-02-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1" } }, "id": "ICSA-24-046-02", "initial_release_date": "2024-02-13T00:00:00.000000Z", "revision_history": [ { "date": "2024-02-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.400", "product": { "name": "SIDIS Prime", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIDIS Prime" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19135", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "mitigation", "details": "CVE-2019-19135: Enable encrypted communication between the affected product (OPC UA client) and the OPC UA server(s)", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19135" }, { "cve": "CVE-2020-1967", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-29862", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-29862" } ] }
icsa-23-348-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nThese GNU/Linux vulnerabilities have been externally identified. Siemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.\n\nNote: This SSA advises vulnerabilities for firmware version V3.1 only; for versions \u003c V3.1 refer to Siemens Security Bulletin SSB-439005 (\nhttps://cert-portal.siemens.com/productcert/html/ssb-439005.html).", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-398330.json" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html" }, { "category": "self", "summary": "ICS Advisory ICSA-23-348-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-348-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-348-10 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1", "tracking": { "current_release_date": "2024-11-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-348-10", "initial_release_date": "2023-12-12T00:00:00.000000Z", "revision_history": [ { "date": "2023-12-12T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2021-44879, CVE-2023-46218, CVE-2023-46219, and CVE-2023-48795" }, { "date": "2024-02-13T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-45898, CVE-2023-46862, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2024-0584" }, { "date": "2024-03-12T00:00:00.000000Z", "legacy_version": "1.3", "number": "4", "summary": "Added CVE-2023-52425, CVE-2023-52426, CVE-2023-45918" }, { "date": "2024-04-09T00:00:00.000000Z", "legacy_version": "1.4", "number": "5", "summary": "Added CVE-2024-28757" }, { "date": "2024-05-14T00:00:00.000000Z", "legacy_version": "1.5", "number": "6", "summary": "Added CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-2511, CVE-2024-28085, CVE-2024-28182, CVE-2024-28834, CVE-2024-28835" }, { "date": "2024-06-11T00:00:00.000000Z", "legacy_version": "1.6", "number": "7", "summary": "Added CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34459" }, { "date": "2024-07-09T00:00:00.000000Z", "legacy_version": "1.7", "number": "8", "summary": "Added CVE-2024-5535, CVE-2024-5742" }, { "date": "2024-08-13T00:00:00.000000Z", "legacy_version": "1.8", "number": "9", "summary": "Added CVE-2017-15422, CVE-2024-7264, CVE-2024-37370, CVE-2024-37371" }, { "date": "2024-10-08T00:00:00.000000Z", "legacy_version": "1.9", "number": "10", "summary": "Added CVE-2024-6409, CVE-2024-8096, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492" }, { "date": "2024-11-12T00:00:00.000000Z", "legacy_version": "2.0", "number": "11", "summary": "Added CVE-2024-2236, CVE-2024-9143" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003e=V3.1.0", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6AG1518-4AX00-4AC0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0340", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2013-0340" }, { "cve": "CVE-2013-4235", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "summary", "text": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2013-4235" }, { "cve": "CVE-2014-7209", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2014-7209" }, { "cve": "CVE-2015-20107", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-20107" }, { "cve": "CVE-2016-3189", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-3189" }, { "cve": "CVE-2016-3709", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-3709" }, { "cve": "CVE-2016-4658", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-4658" }, { "cve": "CVE-2016-5131", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-5131" }, { "cve": "CVE-2016-9318", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-9318" }, { "cve": "CVE-2016-10228", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10228" }, { "cve": "CVE-2016-10739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10739" }, { "cve": "CVE-2017-0663", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-0663" }, { "cve": "CVE-2017-7375", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-7375" }, { "cve": "CVE-2017-7376", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-7376" }, { "cve": "CVE-2017-9047", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9047" }, { "cve": "CVE-2017-9048", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9048" }, { "cve": "CVE-2017-9049", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9049" }, { "cve": "CVE-2017-9050", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-9050" }, { "cve": "CVE-2017-15422", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-15422" }, { "cve": "CVE-2017-16931", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a \u0027%\u0027 character in a DTD name.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-16931" }, { "cve": "CVE-2017-16932", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-16932" }, { "cve": "CVE-2017-17512", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-17512" }, { "cve": "CVE-2017-18258", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-18258" }, { "cve": "CVE-2018-0495", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-0495" }, { "cve": "CVE-2018-12886", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-12886" }, { "cve": "CVE-2018-14404", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14567", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-14567" }, { "cve": "CVE-2018-18928", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-18928" }, { "cve": "CVE-2018-19591", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-19591" }, { "cve": "CVE-2018-20482", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user\u0027s process (e.g., a system backup running as root).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20482" }, { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20843" }, { "cve": "CVE-2018-25032", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-25032" }, { "cve": "CVE-2019-3855", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3855" }, { "cve": "CVE-2019-3856", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3856" }, { "cve": "CVE-2019-3857", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3857" }, { "cve": "CVE-2019-3858", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3858" }, { "cve": "CVE-2019-3859", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3859" }, { "cve": "CVE-2019-3860", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3860" }, { "cve": "CVE-2019-3861", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3861" }, { "cve": "CVE-2019-3862", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3862" }, { "cve": "CVE-2019-3863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-3863" }, { "cve": "CVE-2019-5018", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5018" }, { "cve": "CVE-2019-5094", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5094" }, { "cve": "CVE-2019-5188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5188" }, { "cve": "CVE-2019-5435", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in curl\u0027s URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5435" }, { "cve": "CVE-2019-5436", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5436" }, { "cve": "CVE-2019-5443", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl \u003c= 7.65.1 automatically run the code (as an openssl \"engine\") on invocation. If that curl is invoked by a privileged user it can do anything it wants.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5443" }, { "cve": "CVE-2019-5481", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5481" }, { "cve": "CVE-2019-5482", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-5482" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-6488", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6488" }, { "cve": "CVE-2019-7309", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-7309" }, { "cve": "CVE-2019-8457", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-8457" }, { "cve": "CVE-2019-9169", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9169" }, { "cve": "CVE-2019-9636", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9636" }, { "cve": "CVE-2019-9674", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9674" }, { "cve": "CVE-2019-9740", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9740" }, { "cve": "CVE-2019-9923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9923" }, { "cve": "CVE-2019-9936", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9936" }, { "cve": "CVE-2019-9937", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9937" }, { "cve": "CVE-2019-9947", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9947" }, { "cve": "CVE-2019-9948", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-9948" }, { "cve": "CVE-2019-10160", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "summary", "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-10160" }, { "cve": "CVE-2019-11360", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-11360" }, { "cve": "CVE-2019-12290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-12290" }, { "cve": "CVE-2019-12900", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-12900" }, { "cve": "CVE-2019-12904", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor\u0027s position is that the issue report cannot be validated because there is no description of an attack", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-12904" }, { "cve": "CVE-2019-13057", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-13057" }, { "cve": "CVE-2019-13565", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-13565" }, { "cve": "CVE-2019-13627", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-13627" }, { "cve": "CVE-2019-15847", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-15847" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-15903" }, { "cve": "CVE-2019-16056", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16056" }, { "cve": "CVE-2019-16168", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16168" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16905" }, { "cve": "CVE-2019-17498", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17498" }, { "cve": "CVE-2019-17543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17543" }, { "cve": "CVE-2019-17594", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17594" }, { "cve": "CVE-2019-17595", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-17595" }, { "cve": "CVE-2019-18224", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-18224" }, { "cve": "CVE-2019-18276", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "summary", "text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-18276" }, { "cve": "CVE-2019-18348", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-18348" }, { "cve": "CVE-2019-19126", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19126" }, { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19906", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19906" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2019-19956", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19956" }, { "cve": "CVE-2019-19959", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \u0027\\0\u0027 characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-19959" }, { "cve": "CVE-2019-20218", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20218" }, { "cve": "CVE-2019-20367", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20367" }, { "cve": "CVE-2019-20388", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20388" }, { "cve": "CVE-2019-20795", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20795" }, { "cve": "CVE-2019-20907", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-20907" }, { "cve": "CVE-2019-25013", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-25013" }, { "cve": "CVE-2019-1010022", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010022" }, { "cve": "CVE-2019-1010023", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010023" }, { "cve": "CVE-2019-1010024", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010024" }, { "cve": "CVE-2019-1010025", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor\u0027s position is \"ASLR bypass itself is not a vulnerability.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010025" }, { "cve": "CVE-2019-1010180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1010180" }, { "cve": "CVE-2020-1712", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-1712" }, { "cve": "CVE-2020-1751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-1752" }, { "cve": "CVE-2020-6096", "cwe": { "id": "CWE-195", "name": "Signed to Unsigned Conversion Error" }, "notes": [ { "category": "summary", "text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-6096" }, { "cve": "CVE-2020-7595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-7595" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8315", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker\u0027s copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system\u0027s copy. Windows 8 and later are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8315" }, { "cve": "CVE-2020-8492", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-8492" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-10029", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10029" }, { "cve": "CVE-2020-10531", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10531" }, { "cve": "CVE-2020-10543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10543" }, { "cve": "CVE-2020-10735", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10878", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-10878" }, { "cve": "CVE-2020-11501", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 \u0027\\0\u0027 bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-11501" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-12062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12062" }, { "cve": "CVE-2020-12243", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12243" }, { "cve": "CVE-2020-12723", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12723" }, { "cve": "CVE-2020-12762", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-12762" }, { "cve": "CVE-2020-13434", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13434" }, { "cve": "CVE-2020-13435", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13435" }, { "cve": "CVE-2020-13529", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13529" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13776", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13776" }, { "cve": "CVE-2020-13777", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13777" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-14145", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-14145" }, { "cve": "CVE-2020-14422", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-14422" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-15523", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15523" }, { "cve": "CVE-2020-15778", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15778" }, { "cve": "CVE-2020-15801", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-15801" }, { "cve": "CVE-2020-19185", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19185" }, { "cve": "CVE-2020-19186", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19186" }, { "cve": "CVE-2020-19187", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19187" }, { "cve": "CVE-2020-19188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19188" }, { "cve": "CVE-2020-19189", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19189" }, { "cve": "CVE-2020-19190", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19190" }, { "cve": "CVE-2020-19909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-19909" }, { "cve": "CVE-2020-21047", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-21047" }, { "cve": "CVE-2020-21913", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-21913" }, { "cve": "CVE-2020-22218", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-22218" }, { "cve": "CVE-2020-24659", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-24659" }, { "cve": "CVE-2020-24977", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-24977" }, { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25692" }, { "cve": "CVE-2020-25709", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25709" }, { "cve": "CVE-2020-25710", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25710" }, { "cve": "CVE-2020-26116", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-26116" }, { "cve": "CVE-2020-27618", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-27618" }, { "cve": "CVE-2020-28196", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-28196" }, { "cve": "CVE-2020-29361", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29361" }, { "cve": "CVE-2020-29362", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29362" }, { "cve": "CVE-2020-29363", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29363" }, { "cve": "CVE-2020-29562", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29562" }, { "cve": "CVE-2020-29573", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-29573" }, { "cve": "CVE-2020-35525", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-35525" }, { "cve": "CVE-2020-35527", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-35527" }, { "cve": "CVE-2020-36221", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36221" }, { "cve": "CVE-2020-36222", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36222" }, { "cve": "CVE-2020-36223", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36223" }, { "cve": "CVE-2020-36224", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36224" }, { "cve": "CVE-2020-36225", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36225" }, { "cve": "CVE-2020-36226", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36226" }, { "cve": "CVE-2020-36227", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36227" }, { "cve": "CVE-2020-36228", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36228" }, { "cve": "CVE-2020-36229", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36229" }, { "cve": "CVE-2020-36230", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-36230" }, { "cve": "CVE-2021-3177", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3177" }, { "cve": "CVE-2021-3326", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3326" }, { "cve": "CVE-2021-3426", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3426" }, { "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3516" }, { "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3517" }, { "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3520", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3541", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3541" }, { "cve": "CVE-2021-3580", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3580" }, { "cve": "CVE-2021-3733", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3826", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3997", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3997" }, { "cve": "CVE-2021-3998", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3998" }, { "cve": "CVE-2021-3999", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4122", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-4122" }, { "cve": "CVE-2021-4189", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-4189" }, { "cve": "CVE-2021-4209", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in GnuTLS. As Nettle\u0027s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-4209" }, { "cve": "CVE-2021-20193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20193" }, { "cve": "CVE-2021-20227", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in SQLite\u0027s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20227" }, { "cve": "CVE-2021-20231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20231" }, { "cve": "CVE-2021-20232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20232" }, { "cve": "CVE-2021-20305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-20305" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "**NOTE: CVE-2021-22898 is an incomplete fix (see https://hackerone.com/reports/1223882)! Check if affected products also have fixed CVE-22925 instead! Do not use CVE-2021-22898 in public advisories!**\r\n\r\ncurl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl. This rarely used option is used to send variable=content pairs to TELNET servers. Due to flaw in the option parser for sending `NEW_ENV` variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol. This could happen because curl did not call and use sscanf() correctly when parsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23336", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-23336" }, { "cve": "CVE-2021-27212", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27212" }, { "cve": "CVE-2021-27218", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27218" }, { "cve": "CVE-2021-27219", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27219" }, { "cve": "CVE-2021-27645", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-27645" }, { "cve": "CVE-2021-28041", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28041" }, { "cve": "CVE-2021-28153", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28363", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn\u0027t given via proxy_config) doesn\u0027t verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28363" }, { "cve": "CVE-2021-28861", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-28861" }, { "cve": "CVE-2021-31239", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue found in SQLite SQLite3 v.3.35.4 that could allow a remote attacker to cause a denial of service via the appendvfs.c function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-31239" }, { "cve": "CVE-2021-32292", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-32292" }, { "cve": "CVE-2021-33294", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33294" }, { "cve": "CVE-2021-33560", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33560" }, { "cve": "CVE-2021-33574", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33574" }, { "cve": "CVE-2021-33910", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-33910" }, { "cve": "CVE-2021-35942", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-35942" }, { "cve": "CVE-2021-36084", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36084" }, { "cve": "CVE-2021-36085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36085" }, { "cve": "CVE-2021-36086", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36086" }, { "cve": "CVE-2021-36087", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36087" }, { "cve": "CVE-2021-36222", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-36690", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-36690" }, { "cve": "CVE-2021-37600", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-37600" }, { "cve": "CVE-2021-37750", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-37750" }, { "cve": "CVE-2021-38604", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-38604" }, { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-41617" }, { "cve": "CVE-2021-43396", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious \u0027\\0\u0027 character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states \"the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there\u0027s no security impact to the bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-43396" }, { "cve": "CVE-2021-43618", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-43618" }, { "cve": "CVE-2021-44879", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45960", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46143" }, { "cve": "CVE-2021-46195", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0391", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like \u0027\\r\u0027 and \u0027\\n\u0027 in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0563", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-0563" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1271", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1304", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1343", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1343" }, { "cve": "CVE-2022-1434", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1434" }, { "cve": "CVE-2022-1473", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-1473" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2274", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2274" }, { "cve": "CVE-2022-2509", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-2509" }, { "cve": "CVE-2022-3715", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3821", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-3821" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-22576", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22576" }, { "cve": "CVE-2022-22822", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23852", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23990", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26488", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-26488" }, { "cve": "CVE-2022-27774", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl\u0027s \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "summary", "text": "The curl URL parser wrongly accepts percent-encoded URL separators like \u0027/\u0027when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server\u0027s certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-27943" }, { "cve": "CVE-2022-28321", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn\u0027t correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-28321" }, { "cve": "CVE-2022-29155", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-29155" }, { "cve": "CVE-2022-29824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-29824" }, { "cve": "CVE-2022-30115", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-30115" }, { "cve": "CVE-2022-32205", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-32221" }, { "cve": "CVE-2022-35252", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "summary", "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-35737" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-40674" }, { "cve": "CVE-2022-42898", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42915", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in curl \u003c7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop U+002E (.). Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-43680" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46908", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-46908" }, { "cve": "CVE-2022-48303", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48522", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-48522" }, { "cve": "CVE-2022-48560", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2022-48560" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0361", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0687", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It\u0027s basically trusted input or input that needs an actual security flaw to be compromised or controlled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-0687" }, { "cve": "CVE-2023-1077", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1206", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-1206" }, { "cve": "CVE-2023-2650", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(square(n)) with \u0027n\u0027 being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer\u0027s certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-2650" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3212", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3212" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3609", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3609" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3772", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3772" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4016", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4016" }, { "cve": "CVE-2023-4039", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "summary", "text": "A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4039" }, { "cve": "CVE-2023-4527", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4527" }, { "cve": "CVE-2023-4623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-4806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4806" }, { "cve": "CVE-2023-4807", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4813", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4813" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-4921", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-5156", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5156" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5717", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5717" }, { "cve": "CVE-2023-5981", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-5981" }, { "cve": "CVE-2023-6121", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6121" }, { "cve": "CVE-2023-6817", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6817" }, { "cve": "CVE-2023-6931", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-6932" }, { "cve": "CVE-2023-23914", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \"links\" in this \"decompression chain\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24329", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25136", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-25136" }, { "cve": "CVE-2023-25139", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-25139" }, { "cve": "CVE-2023-26604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27371", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more \u0027\\0\u0027 bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27371" }, { "cve": "CVE-2023-27533", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \"telnet options\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application\u0027s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse. libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-27538" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-28531", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-28531" }, { "cve": "CVE-2023-29383", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-29491", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29491" }, { "cve": "CVE-2023-29499", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-29499" }, { "cve": "CVE-2023-31085", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-31085" }, { "cve": "CVE-2023-32611", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32611" }, { "cve": "CVE-2023-32636", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32636" }, { "cve": "CVE-2023-32643", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32643" }, { "cve": "CVE-2023-32665", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-32665" }, { "cve": "CVE-2023-34319", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The fix for XSA-423 added logic to Linux\u0027es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn\u0027t account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that\u0027s specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-34319" }, { "cve": "CVE-2023-34969", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35945", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy\u2019s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-35945" }, { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-38408" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "summary", "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-39128", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39128" }, { "cve": "CVE-2023-39189", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39189" }, { "cve": "CVE-2023-39192", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-39194", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39194" }, { "cve": "CVE-2023-39615", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor\u0027s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-39615" }, { "cve": "CVE-2023-40283", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-40283" }, { "cve": "CVE-2023-42754", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42755", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-42755" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45322", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor\u0027s position is \"I don\u0027t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can\u0027t control when memory allocations fail.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45322" }, { "cve": "CVE-2023-45853", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45853" }, { "cve": "CVE-2023-45871", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45871" }, { "cve": "CVE-2023-45898", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45898" }, { "cve": "CVE-2023-45918", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-45918" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-46862", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-46862" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-0584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-0584" }, { "cve": "CVE-2024-2004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2004" }, { "cve": "CVE-2024-2236", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing-based side-channel flaw was found in libgcrypt\u0027s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2236" }, { "cve": "CVE-2024-2379", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2379" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-2466", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "notes": [ { "category": "summary", "text": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2466" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions\r\nImpact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5742", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-5742" }, { "cve": "CVE-2024-6409", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "notes": [ { "category": "summary", "text": "A race condition vulnerability was discovered in how signals are handled by OpenSSH\u0027s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd\u0027s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-6409" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-8096", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than \u0027revoked\u0027 (like for example \u0027unauthorized\u0027) it is not treated as a bad certficate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-8096" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-28085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28085" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28757", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28757" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "notes": [ { "category": "summary", "text": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-28835" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow. This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference. This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients. The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34459", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-34459" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2024-45492" } ] }
rhsa-2022_4899
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for compat-openssl11 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl11 provides the legacy 1.1 version of OpenSSL for use with older binaries.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* compat-openssl11 breaks in FIPS (BZ#2091968)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:4899", "url": "https://access.redhat.com/errata/RHSA-2022:4899" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4899.json" } ], "title": "Red Hat Security Advisory: compat-openssl11 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T23:01:25+00:00", "generator": { "date": "2024-12-17T23:01:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:4899", "initial_release_date": "2022-06-03T23:04:14+00:00", "revision_history": [ { "date": "2022-06-03T23:04:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-06-03T23:04:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:01:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "compat-openssl11-1:1.1.1k-4.el9_0.src", "product": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.src", "product_id": "compat-openssl11-1:1.1.1k-4.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11@1.1.1k-4.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "product": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "product_id": "compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11@1.1.1k-4.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "product": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "product_id": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debugsource@1.1.1k-4.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "product": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "product_id": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debuginfo@1.1.1k-4.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "product": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "product_id": "compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11@1.1.1k-4.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "product": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "product_id": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debugsource@1.1.1k-4.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "product": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "product_id": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debuginfo@1.1.1k-4.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "compat-openssl11-1:1.1.1k-4.el9_0.i686", "product": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.i686", "product_id": "compat-openssl11-1:1.1.1k-4.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11@1.1.1k-4.el9_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "product": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "product_id": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debugsource@1.1.1k-4.el9_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "product": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "product_id": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debuginfo@1.1.1k-4.el9_0?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "product": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "product_id": "compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11@1.1.1k-4.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64", "product": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64", "product_id": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debugsource@1.1.1k-4.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "product": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "product_id": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debuginfo@1.1.1k-4.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "compat-openssl11-1:1.1.1k-4.el9_0.s390x", "product": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.s390x", "product_id": "compat-openssl11-1:1.1.1k-4.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11@1.1.1k-4.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "product": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "product_id": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debugsource@1.1.1k-4.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "product": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "product_id": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl11-debuginfo@1.1.1k-4.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.aarch64" }, "product_reference": "compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.i686" }, "product_reference": "compat-openssl11-1:1.1.1k-4.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.ppc64le" }, "product_reference": "compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.s390x" }, "product_reference": "compat-openssl11-1:1.1.1k-4.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.src" }, "product_reference": "compat-openssl11-1:1.1.1k-4.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-1:1.1.1k-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.x86_64" }, "product_reference": "compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64" }, "product_reference": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686" }, "product_reference": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le" }, "product_reference": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x" }, "product_reference": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64" }, "product_reference": "compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64" }, "product_reference": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686" }, "product_reference": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le" }, "product_reference": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x" }, "product_reference": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64" }, "product_reference": "compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T23:04:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4899" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debuginfo-1:1.1.1k-4.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.i686", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:compat-openssl11-debugsource-1:1.1.1k-4.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_5326
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for compat-openssl10 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries.\n\nSecurity Fix(es):\n\n* compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5326", "url": "https://access.redhat.com/errata/RHSA-2022:5326" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5326.json" } ], "title": "Red Hat Security Advisory: compat-openssl10 security update", "tracking": { "current_release_date": "2024-12-17T23:00:27+00:00", "generator": { "date": "2024-12-17T23:00:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5326", "initial_release_date": "2022-06-30T21:05:00+00:00", "revision_history": [ { "date": "2022-06-30T21:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-06-30T21:05:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "compat-openssl10-1:1.0.2o-4.el8_6.src", "product": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.src", "product_id": "compat-openssl10-1:1.0.2o-4.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10@1.0.2o-4.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "product": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "product_id": "compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10@1.0.2o-4.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "product": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "product_id": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debugsource@1.0.2o-4.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "product": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "product_id": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debuginfo@1.0.2o-4.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "product": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "product_id": "compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10@1.0.2o-4.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "product": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "product_id": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debugsource@1.0.2o-4.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "product": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "product_id": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debuginfo@1.0.2o-4.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "compat-openssl10-1:1.0.2o-4.el8_6.i686", "product": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.i686", "product_id": "compat-openssl10-1:1.0.2o-4.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10@1.0.2o-4.el8_6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "product": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "product_id": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debugsource@1.0.2o-4.el8_6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "product": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "product_id": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debuginfo@1.0.2o-4.el8_6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "product": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "product_id": "compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10@1.0.2o-4.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64", "product": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64", "product_id": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debugsource@1.0.2o-4.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "product": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "product_id": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debuginfo@1.0.2o-4.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "compat-openssl10-1:1.0.2o-4.el8_6.s390x", "product": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.s390x", "product_id": "compat-openssl10-1:1.0.2o-4.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10@1.0.2o-4.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "product": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "product_id": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debugsource@1.0.2o-4.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "product": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "product_id": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/compat-openssl10-debuginfo@1.0.2o-4.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.aarch64" }, "product_reference": "compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.i686" }, "product_reference": "compat-openssl10-1:1.0.2o-4.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.ppc64le" }, "product_reference": "compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.s390x" }, "product_reference": "compat-openssl10-1:1.0.2o-4.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.src" }, "product_reference": "compat-openssl10-1:1.0.2o-4.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-1:1.0.2o-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.x86_64" }, "product_reference": "compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64" }, "product_reference": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686" }, "product_reference": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le" }, "product_reference": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x" }, "product_reference": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64" }, "product_reference": "compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64" }, "product_reference": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686" }, "product_reference": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le" }, "product_reference": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x" }, "product_reference": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64" }, "product_reference": "compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T21:05:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5326" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debuginfo-1:1.0.2o-4.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.i686", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:compat-openssl10-debugsource-1:1.0.2o-4.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1076
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1076", "url": "https://access.redhat.com/errata/RHSA-2022:1076" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1076.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:48+00:00", "generator": { "date": "2024-12-17T23:00:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1076", "initial_release_date": "2022-03-28T09:57:02+00:00", "revision_history": [ { "date": "2022-03-28T09:57:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T09:57:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-10.el7_4.src", "product": { "name": "openssl-1:1.0.2k-10.el7_4.src", "product_id": "openssl-1:1.0.2k-10.el7_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-10.el7_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-10.el7_4.x86_64", "product": { "name": "openssl-1:1.0.2k-10.el7_4.x86_64", "product_id": "openssl-1:1.0.2k-10.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-10.el7_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-10.el7_4.x86_64", "product": { "name": "openssl-devel-1:1.0.2k-10.el7_4.x86_64", "product_id": "openssl-devel-1:1.0.2k-10.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-10.el7_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-10.el7_4.x86_64", "product": { "name": "openssl-libs-1:1.0.2k-10.el7_4.x86_64", "product_id": "openssl-libs-1:1.0.2k-10.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-10.el7_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "product_id": "openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-10.el7_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-10.el7_4.x86_64", "product": { "name": "openssl-perl-1:1.0.2k-10.el7_4.x86_64", "product_id": "openssl-perl-1:1.0.2k-10.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-10.el7_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-10.el7_4.x86_64", "product": { "name": "openssl-static-1:1.0.2k-10.el7_4.x86_64", "product_id": "openssl-static-1:1.0.2k-10.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-10.el7_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.2k-10.el7_4.i686", "product": { "name": "openssl-devel-1:1.0.2k-10.el7_4.i686", "product_id": "openssl-devel-1:1.0.2k-10.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-10.el7_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-10.el7_4.i686", "product": { "name": "openssl-libs-1:1.0.2k-10.el7_4.i686", "product_id": "openssl-libs-1:1.0.2k-10.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-10.el7_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "product": { "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "product_id": "openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-10.el7_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-10.el7_4.i686", "product": { "name": "openssl-static-1:1.0.2k-10.el7_4.i686", "product_id": "openssl-static-1:1.0.2k-10.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-10.el7_4?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-10.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src" }, "product_reference": "openssl-1:1.0.2k-10.el7_4.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-devel-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-libs-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-static-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-10.el7_4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src" }, "product_reference": "openssl-1:1.0.2k-10.el7_4.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-devel-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-libs-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-10.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686" }, "product_reference": "openssl-static-1:1.0.2k-10.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-10.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-10.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T09:57:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1076" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.src", "7Server-optional-7.4.AUS:openssl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-10.el7_4.x86_64", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.i686", "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-10.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1520
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 5.6.2 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.6.2 serves as a replacement for Red Hat JBoss Web Server 5.6.1. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1520", "url": "https://access.redhat.com/errata/RHSA-2022:1520" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1520.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.2 Security Update", "tracking": { "current_release_date": "2024-12-17T23:00:59+00:00", "generator": { "date": "2024-12-17T23:00:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1520", "initial_release_date": "2022-05-02T11:03:37+00:00", "revision_history": [ { "date": "2022-05-02T11:03:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-02T11:03:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5", "product": { "name": "Red Hat JBoss Web Server 5", "product_id": "Red Hat JBoss Web Server 5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-02T11:03:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1520" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1077
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1077", "url": "https://access.redhat.com/errata/RHSA-2022:1077" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1077.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:27+00:00", "generator": { "date": "2024-12-17T23:00:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1077", "initial_release_date": "2022-03-28T11:42:31+00:00", "revision_history": [ { "date": "2022-03-28T11:42:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T11:42:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-21.el7_7.src", "product": { "name": "openssl-1:1.0.2k-21.el7_7.src", "product_id": "openssl-1:1.0.2k-21.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_7?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-21.el7_7.x86_64", "product": { "name": "openssl-1:1.0.2k-21.el7_7.x86_64", "product_id": "openssl-1:1.0.2k-21.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "product": { "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "product_id": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "product": { "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "product_id": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "product_id": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "product": { "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "product_id": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "product": { "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "product_id": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.2k-21.el7_7.i686", "product": { "name": "openssl-devel-1:1.0.2k-21.el7_7.i686", "product_id": "openssl-devel-1:1.0.2k-21.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_7?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-21.el7_7.i686", "product": { "name": "openssl-libs-1:1.0.2k-21.el7_7.i686", "product_id": "openssl-libs-1:1.0.2k-21.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_7?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "product": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "product_id": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_7?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-21.el7_7.i686", "product": { "name": "openssl-static-1:1.0.2k-21.el7_7.i686", "product_id": "openssl-static-1:1.0.2k-21.el7_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_7?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-21.el7_7.ppc64le", "product": { "name": "openssl-1:1.0.2k-21.el7_7.ppc64le", "product_id": "openssl-1:1.0.2k-21.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "product": { "name": "openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "product_id": "openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "product": { "name": "openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "product_id": "openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "product_id": "openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "product": { "name": "openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "product_id": "openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-21.el7_7.ppc64le", "product": { "name": "openssl-static-1:1.0.2k-21.el7_7.ppc64le", "product_id": "openssl-static-1:1.0.2k-21.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.src", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.src", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.src", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.i686", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-21.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-21.el7_7.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T11:42:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1077" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.AUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.AUS:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.E4S:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.ppc64le", "7Server-optional-7.7.E4S:openssl-static-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.src", "7Server-optional-7.7.TUS:openssl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-debuginfo-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-devel-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-libs-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-perl-1:1.0.2k-21.el7_7.x86_64", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.i686", "7Server-optional-7.7.TUS:openssl-static-1:1.0.2k-21.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1389
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1389", "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1389.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2024-12-17T23:00:33+00:00", "generator": { "date": "2024-12-17T23:00:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1389", "initial_release_date": "2022-04-20T19:44:47+00:00", "revision_history": [ { "date": "2022-04-20T19:44:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:44:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
rhsa-2022_4956
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.5.0 is now generally available.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.5.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/\n\nSecurity fixes: \n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* containerd: Unprivileged pod may bind mount any privileged regular file on disk (CVE-2021-43816)\n\n* minio: user privilege escalation in AddUser() admin API (CVE-2021-43858)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path (CVE-2022-24778)\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)\n\n* nconf: Prototype pollution in memory store (CVE-2022-21803)\n\n* golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n\n* nats-server: misusing the \"dynamically provisioned sandbox accounts\" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\n* go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810)\n\n* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)\n\nBug fixes:\n\n* RFE Copy secret with specific secret namespace, name for source and name, namespace and cluster label for target (BZ# 2014557)\n\n* RHACM 2.5.0 images (BZ# 2024938)\n\n* [UI] When you delete host agent from infraenv no confirmation message appear (Are you sure you want to delete x?) (BZ#2028348)\n\n* Clusters are in \u0027Degraded\u0027 status with upgrade env due to obs-controller not working properly (BZ# 2028647)\n\n* create cluster pool -\u003e choose infra type, As a result infra providers disappear from UI. (BZ# 2033339)\n\n* Restore/backup shows up as Validation failed but the restore backup status in ACM shows success (BZ# 2034279)\n\n* Observability - OCP 311 node role are not displayed completely (BZ# 2038650)\n\n* Documented uninstall procedure leaves many leftovers (BZ# 2041921)\n\n* infrastructure-operator pod crashes due to insufficient privileges in ACM 2.5 (BZ# 2046554)\n\n* Acm failed to install due to some missing CRDs in operator (BZ# 2047463)\n\n* Navigation icons no longer showing in ACM 2.5 (BZ# 2051298)\n\n* ACM home page now includes /home/ in url (BZ# 2051299)\n\n* proxy heading in Add Credential should be capitalized (BZ# 2051349)\n\n* ACM 2.5 tries to create new MCE instance when install on top of existing MCE 2.0 (BZ# 2051983)\n\n* Create Policy button does not work and user cannot use console to create policy (BZ# 2053264)\n\n* No cluster information was displayed after a policyset was created (BZ# 2053366)\n\n* Dynamic plugin update does not take effect in Firefox (BZ# 2053516)\n\n* Replicated policy should not be available when creating a Policy Set (BZ# 2054431)\n\n* Placement section in Policy Set wizard does not reset when users click \"Back\" to re-configured placement (BZ# 2054433)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:4956", "url": "https://access.redhat.com/errata/RHSA-2022:4956" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2014557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014557" }, { "category": "external", "summary": "2024702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024702" }, { "category": "external", "summary": "2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "2028224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028224" }, { "category": "external", "summary": "2028348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028348" }, { "category": "external", "summary": "2028647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028647" }, { "category": "external", "summary": "2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "2033339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033339" }, { "category": "external", "summary": "2034279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034279" }, { "category": "external", "summary": "2036252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036252" }, { "category": "external", "summary": "2038650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038650" }, { "category": "external", "summary": "2041921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041921" }, { "category": "external", "summary": "2044434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044434" }, { "category": "external", "summary": "2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "2046554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046554" }, { "category": "external", "summary": "2047463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047463" }, { "category": "external", "summary": "2051298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051298" }, { "category": "external", "summary": "2051299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051299" }, { "category": "external", "summary": "2051349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051349" }, { "category": "external", "summary": "2051983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051983" }, { "category": "external", "summary": "2052573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052573" }, { "category": "external", "summary": "2053264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053264" }, { "category": "external", "summary": "2053366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053366" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053516" }, { "category": "external", "summary": "2054431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054431" }, { "category": "external", "summary": "2054433", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054433" }, { "category": "external", "summary": "2054772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054772" }, { "category": "external", "summary": "2054860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054860" }, { "category": "external", "summary": "2055333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055333" }, { "category": "external", "summary": "2055900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055900" }, { "category": "external", "summary": "2056485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056485" }, { "category": "external", "summary": "2056701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056701" }, { "category": "external", "summary": "2057060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057060" }, { "category": "external", "summary": "2058435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058435" }, { "category": "external", "summary": "2059779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059779" }, { "category": "external", "summary": "2059781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059781" }, { "category": "external", "summary": "2060135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060135" }, { "category": "external", "summary": "2060151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060151" }, { "category": "external", "summary": "2060230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060230" }, { "category": "external", "summary": "2060309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060309" }, { "category": "external", "summary": "2060469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060469" }, { "category": "external", "summary": "2060550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060550" }, { "category": "external", "summary": "2060603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060603" }, { "category": "external", "summary": "2060831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060831" }, { "category": "external", "summary": "2060934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060934" }, { "category": "external", "summary": "2061260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061260" }, { "category": "external", "summary": "2061311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061311" }, { "category": "external", "summary": "2061659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061659" }, { "category": "external", "summary": "2061798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061798" }, { "category": "external", "summary": "2061838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061838" }, { "category": "external", "summary": "2062009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062009" }, { "category": "external", "summary": "2062022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062022" }, { "category": "external", "summary": "2062025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062025" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2062337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062337" }, { "category": "external", "summary": "2062462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062462" }, { "category": "external", "summary": "2062556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062556" }, { "category": "external", "summary": "2062787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062787" }, { "category": "external", "summary": "2063055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063055" }, { "category": "external", "summary": "2063341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063341" }, { "category": "external", "summary": "2063345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063345" }, { "category": "external", "summary": "2063596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063596" }, { "category": "external", "summary": "2063599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063599" }, { "category": "external", "summary": "2063697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063697" }, { "category": "external", "summary": "2064231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064231" }, { "category": "external", "summary": "2064247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064247" }, { "category": "external", "summary": "2064392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064392" }, { "category": "external", "summary": "2064477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064477" }, { "category": "external", "summary": "2064509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064509" }, { "category": "external", "summary": "2064516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064516" }, { "category": "external", "summary": "2064528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064528" }, { "category": "external", "summary": "2064535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064535" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2064722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064722" }, { "category": "external", "summary": "2064899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064899" }, { "category": "external", "summary": "2065436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065436" }, { "category": "external", "summary": "2066198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066198" }, { "category": "external", "summary": "2066207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066207" }, { "category": "external", "summary": "2066333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066333" }, { "category": "external", "summary": "2066383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066383" }, { "category": "external", "summary": "2066433", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066433" }, { "category": "external", "summary": "2066464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066464" }, { "category": "external", "summary": "2066475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066475" }, { "category": "external", "summary": "2066544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066544" }, { "category": "external", "summary": "2066594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066594" }, { "category": "external", "summary": "2066650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066650" }, { "category": "external", "summary": "2066751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066751" }, { "category": "external", "summary": "2066834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066834" }, { "category": "external", "summary": "2066842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066842" }, { "category": "external", "summary": "2066914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066914" }, { "category": "external", "summary": "2066940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066940" }, { "category": "external", "summary": "2066965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066965" }, { "category": "external", "summary": "2066979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066979" }, { "category": "external", "summary": "2067053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067053" }, { "category": "external", "summary": "2067067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067067" }, { "category": "external", "summary": "2067207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067207" }, { "category": "external", "summary": "2067465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067465" }, { "category": "external", "summary": "2067713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067713" }, { "category": "external", "summary": "2067728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067728" }, { "category": "external", "summary": "2068304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068304" }, { "category": "external", "summary": "2068309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068309" }, { "category": "external", "summary": "2068312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068312" }, { "category": "external", "summary": "2068313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068313" }, { "category": "external", "summary": "2068328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068328" }, { "category": "external", "summary": "2068387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068387" }, { "category": "external", "summary": "2068993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068993" }, { "category": "external", "summary": "2069329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069329" }, { "category": "external", "summary": "2069368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069368" }, { "category": "external", "summary": "2069469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069469" }, { "category": "external", "summary": "2069615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069615" }, { "category": "external", "summary": "2069622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069622" }, { "category": "external", "summary": "2069698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069698" }, { "category": "external", "summary": "2069867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069867" }, { "category": "external", "summary": "2069870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069870" }, { "category": "external", "summary": "2069875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069875" }, { "category": "external", "summary": "2069895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069895" }, { "category": "external", "summary": "2070203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070203" }, { "category": "external", "summary": "2070782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070782" }, { "category": "external", "summary": "2070846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070846" }, { "category": "external", "summary": "2071066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071066" }, { "category": "external", "summary": "2071173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071173" }, { "category": "external", "summary": "2071191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071191" }, { "category": "external", "summary": "2071769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071769" }, { "category": "external", "summary": "2071818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071818" }, { "category": "external", "summary": "2071869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071869" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2072097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072097" }, { "category": "external", "summary": "2072104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072104" }, { "category": "external", "summary": "2072177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072177" }, { "category": "external", "summary": "2072227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072227" }, { "category": "external", "summary": "2072231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072231" }, { "category": "external", "summary": "2072334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072334" }, { "category": "external", "summary": "2072342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072342" }, { "category": "external", "summary": "2072350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072350" }, { "category": "external", "summary": "2072359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072359" }, { "category": "external", "summary": "2072504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072504" }, { "category": "external", "summary": "2072551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072551" }, { "category": "external", "summary": "2072773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072773" }, { "category": "external", "summary": "2072824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072824" }, { "category": "external", "summary": "2072829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072829" }, { "category": "external", "summary": "2073179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073179" }, { "category": "external", "summary": "2073330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073330" }, { "category": "external", "summary": "2073355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073355" }, { "category": "external", "summary": "2073508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073508" }, { "category": "external", "summary": "2073557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073557" }, { "category": "external", "summary": "2073726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073726" }, { "category": "external", "summary": "2073739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073739" }, { "category": "external", "summary": "2073740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073740" }, { "category": "external", "summary": "2074178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074178" }, { "category": "external", "summary": "2074626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074626" }, { "category": "external", "summary": "2074689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074689" }, { "category": "external", "summary": "2074803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074803" }, { "category": "external", "summary": "2074937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074937" }, { "category": "external", "summary": "2075416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075416" }, { "category": "external", "summary": "2075440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075440" }, { "category": "external", "summary": "2075739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075739" }, { "category": "external", "summary": "2076421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076421" }, { "category": "external", "summary": "2076494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076494" }, { "category": "external", "summary": "2076502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076502" }, { "category": "external", "summary": "2077144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077144" }, { "category": "external", "summary": "2077149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077149" }, { "category": "external", "summary": "2077291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077291" }, { "category": "external", "summary": "2077304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077304" }, { "category": "external", "summary": "2077526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077526" }, { "category": "external", "summary": "2077562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077562" }, { "category": "external", "summary": "2077751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077751" }, { "category": "external", "summary": "2077783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077783" }, { "category": "external", "summary": "2077951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077951" }, { "category": "external", "summary": "2078164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078164" }, { "category": "external", "summary": "2078167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078167" }, { "category": "external", "summary": "2078373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078373" }, { "category": "external", "summary": "2078617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078617" }, { "category": "external", "summary": "2078952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078952" }, { "category": "external", "summary": "2078973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078973" }, { "category": "external", "summary": "2079013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079013" }, { "category": "external", "summary": "2079015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079015" }, { "category": "external", "summary": "2079421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079421" }, { "category": "external", "summary": "2079494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079494" }, { "category": "external", "summary": "2079533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079533" }, { "category": "external", "summary": "2079585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079585" }, { "category": "external", "summary": "2079611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079611" }, { "category": "external", "summary": "2079615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079615" }, { "category": "external", "summary": "2079658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079658" }, { "category": "external", "summary": "2079909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079909" }, { "category": "external", "summary": "2080172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080172" }, { "category": "external", "summary": "2080215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080215" }, { "category": "external", "summary": "2080279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080279" }, { "category": "external", "summary": "2080503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080503" }, { "category": "external", "summary": "2080567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080567" }, { "category": "external", "summary": "2080712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080712" }, { "category": "external", "summary": "2080776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080776" }, { "category": "external", "summary": "2081792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081792" }, { "category": "external", "summary": "2081810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081810" }, { "category": "external", "summary": "2081829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081829" }, { "category": "external", "summary": "2081938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081938" }, { "category": "external", "summary": "2082226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082226" }, { "category": "external", "summary": "2082409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082409" }, { "category": "external", "summary": "2082449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082449" }, { "category": "external", "summary": "2083038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083038" }, { "category": "external", "summary": "2083160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083160" }, { "category": "external", "summary": "2083434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083434" }, { "category": "external", "summary": "2083854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083854" }, { "category": "external", "summary": "2083870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083870" }, { "category": "external", "summary": "2084034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084034" }, { "category": "external", "summary": "2084158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084158" }, { "category": "external", "summary": "2084622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084622" }, { "category": "external", "summary": "2085083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085083" }, { "category": "external", "summary": "2085237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085237" }, { "category": "external", "summary": "2085273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085273" }, { "category": "external", "summary": "2085281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085281" }, { "category": "external", "summary": "2086389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086389" }, { "category": "external", "summary": "2087515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087515" }, { "category": "external", "summary": "2088158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088158" }, { "category": "external", "summary": "2088511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088511" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4956.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixes", "tracking": { "current_release_date": "2024-12-17T23:01:33+00:00", "generator": { "date": "2024-12-17T23:01:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:4956", "initial_release_date": "2022-06-09T02:03:35+00:00", "revision_history": [ { "date": "2022-06-09T02:03:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-06-09T02:03:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:01:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.5::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.0-18" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.0-304" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.0-75" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "product_id": "rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.0-152" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.0-40" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.0-33" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.0-70" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.0-66" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.0-63" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.0-16" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "product_id": "rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.0-42" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.0-11" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.0-18" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.0-304" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.0-75" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "product_id": "rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.0-152" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.0-40" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.0-33" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.0-70" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.0-66" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.0-63" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.0-16" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "product_id": "rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.0-42" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.0-11" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.0-18" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.0-304" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.0-75" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.0-152" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.0-40" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.0-33" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.0-70" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.0-66" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.0-63" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.0-16" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.0-42" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.0-11" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "product": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "product_id": "rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8\u0026tag=v2.5.0-18" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.5.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "product_id": "rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.5.0-304" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8\u0026tag=v2.5.0-10" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "product": { "name": "rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "product_id": "rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.5.0-75" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.5.0-21" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.5.0-32" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "product": { "name": "rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "product_id": "rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.5.0-152" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.5.0-40" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.5.0-27" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "product_id": "rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.5.0-33" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "product_id": "rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "product": { "name": "rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "product_id": "rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.5.0-9" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.5.0-22" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.5.0-70" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.5.0-66" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.5.0-57" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.5.0-23" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.5.0-63" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "product_id": "rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.5.0-11" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "product_id": "rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.5.0-12" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "product_id": "rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.5.0-14" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.5.0-58" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.5.0-16" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.5.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "product": { "name": "rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "product_id": "rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.5.0-25" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "product_id": "rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.5.0-20" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "product": { "name": "rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "product_id": "rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.5.0-42" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "product": { "name": "rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "product_id": "rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.5.0-17" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.5.0-11" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64" }, "product_reference": "rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64" }, "product_reference": "rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64" }, "product_reference": "rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64" }, "product_reference": "rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3918", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2021-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024702" } ], "notes": [ { "category": "description", "text": "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-json-schema: Prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "RHBZ#2024702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3918" } ], "release_date": "2021-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs-json-schema: Prototype pollution vulnerability" }, { "cve": "CVE-2021-41190", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024938" } ], "notes": [ { "category": "description", "text": "The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Image Specification, the manifest and index documents were not self-describing and documents with a single digest could be interpreted as either a manifest or an index. In the OCI Image Specification version 1.0.1 there is specified a recommendation that both manifest and index documents contain a `mediaType` field to identify the type of document.", "title": "Vulnerability description" }, { "category": "summary", "text": "opencontainers: OCI manifest and index parsing confusion", "title": "Vulnerability summary" }, { "category": "other", "text": "As a consequence of the OCI Image Specification (and OCI Distribution Specification [1]), container runtime engines (like containerd, moby - Docker Engine, cri-o) deliver updates to adopt new `mediaType` field used for identification of the document type. Even though some Red Hat products rely on container engine, the impact by this issue is LOW.\n\n[1] https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41190" }, { "category": "external", "summary": "RHBZ#2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190" }, { "category": "external", "summary": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42", "url": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42" }, { "category": "external", "summary": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "url": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m" }, { "category": "external", "summary": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh", "url": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh" } ], "release_date": "2021-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "opencontainers: OCI manifest and index parsing confusion" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2021-43816", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044434" } ], "notes": [ { "category": "description", "text": "An incorrect permission assignment flaw was found in containerd. This flaw allows a local attacker to use a specially designed text file to read and write files outside of the container\u0027s scope.", "title": "Vulnerability description" }, { "category": "summary", "text": "containerd: Unprivileged pod may bind mount any privileged regular file on disk", "title": "Vulnerability summary" }, { "category": "other", "text": "Because Red Hat OpenStack Platform\u0027s director-operator does not use hostPath volumes, the RHOSP Impact has been rated Low impact and no updates will be provided at this time for its containers.\n\nIn Red Hat OpenShift Container Platform (OCP) the containerd package is not actually used, but because the containerd API is supported the core OCP components are listed as affected by this CVE and the impact is reduced to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43816" }, { "category": "external", "summary": "RHBZ#2044434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43816", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43816" }, { "category": "external", "summary": "https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c", "url": "https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c" } ], "release_date": "2022-01-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "containerd: Unprivileged pod may bind mount any privileged regular file on disk" }, { "cve": "CVE-2021-43858", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-12-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2036252" } ], "notes": [ { "category": "description", "text": "MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API.", "title": "Vulnerability description" }, { "category": "summary", "text": "minio: user privilege escalation in AddUser() admin API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43858" }, { "category": "external", "summary": "RHBZ#2036252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43858", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43858" }, { "category": "external", "summary": "https://github.com/minio/minio/security/advisories/GHSA-j6jc-jqqc-p6cx", "url": "https://github.com/minio/minio/security/advisories/GHSA-j6jc-jqqc-p6cx" } ], "release_date": "2021-12-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" }, { "category": "workaround", "details": "There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "minio: user privilege escalation in AddUser() admin API" }, { "cve": "CVE-2022-0235", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2022-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044591" } ], "notes": [ { "category": "description", "text": "A flaw was found in node-fetch. When following a redirect to a third-party domain, node-fetch was forwarding sensitive headers such as \"Authorization,\" \"WWW-Authenticate,\" and \"Cookie\" to potentially untrusted targets. This flaw leads to the exposure of sensitive information to an unauthorized actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-fetch: exposure of sensitive information to an unauthorized actor", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0. For more information about Dotnet product support scope, please see https://access.redhat.com/support/policy/updates/net-core", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0235" }, { "category": "external", "summary": "RHBZ#2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" }, { "category": "external", "summary": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/", "url": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-fetch: exposure of sensitive information to an unauthorized actor" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-21803", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-04-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2074689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the nconf library when setting the configuration properties. This flaw allows an attacker to provide a crafted property, leading to prototype object pollution.", "title": "Vulnerability description" }, { "category": "summary", "text": "nconf: Prototype pollution in memory store", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21803" }, { "category": "external", "summary": "RHBZ#2074689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21803", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21803" }, { "category": "external", "summary": "https://github.com/allengayCx/nodegoat/issues/88", "url": "https://github.com/allengayCx/nodegoat/issues/88" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nconf: Prototype pollution in memory store" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24450", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2052573" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NATS nats-server in an experimental feature that provides dynamically provisioned sandbox accounts that do not check the clients\u2019 authorization. This flaw allows an attacker to take advantage of its valid account and switch over to another existing account without further authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "nats-server: misusing the \"dynamically provisioned sandbox accounts\" feature authenticated user can obtain the privileges of the System account", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24450" }, { "category": "external", "summary": "RHBZ#2052573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24450" }, { "category": "external", "summary": "https://advisories.nats.io/CVE/CVE-2022-24450.txt", "url": "https://advisories.nats.io/CVE/CVE-2022-24450.txt" } ], "release_date": "2022-02-07T12:40:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nats-server: misusing the \"dynamically provisioned sandbox accounts\" feature authenticated user can obtain the privileges of the System account" }, { "cve": "CVE-2022-24778", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2022-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2069368" } ], "notes": [ { "category": "description", "text": "A flaw was found in the imgcrypt library when checking the keys of an authorized user to access an encrypted image on systems where layers are not available and cannot run on the host architecture. This flaw allows an attacker to run an image without providing the previously decrypted keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path", "title": "Vulnerability summary" }, { "category": "other", "text": "Only Fedora is using the affected codebase. Hence, marking other products as of Low impact as they are using an affected version of \u0027imgcrypt\u0027 as a transitive dependency.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24778" }, { "category": "external", "summary": "RHBZ#2069368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24778" }, { "category": "external", "summary": "https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm", "url": "https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm" } ], "release_date": "2022-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" }, { "cve": "CVE-2022-29810", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2022-04-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2080279" } ], "notes": [ { "category": "description", "text": "A flaw was found in go-getter, where the go-getter library can write SSH credentials into its log file. This flaw allows a local user with access to read log files to read sensitive credentials, which may lead to privilege escalation or account takeover.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29810" }, { "category": "external", "summary": "RHBZ#2080279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080279" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29810", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29810" }, { "category": "external", "summary": "https://github.com/golang/vulndb/issues/438", "url": "https://github.com/golang/vulndb/issues/438" } ], "release_date": "2022-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-09T02:03:35+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on installing this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:3f23180da46351216ee33a4bfc67f0b8aa0dd64208da7dac7f81daaec5009a11_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:643a49afe7b5682c0f5e56941ae601aa8f5031c9c63a0bb781a422be954b0879_arm64", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:82557f8506bcaf48e701d815ad0bedd636d99ab649d00fcb1d3b982a85a6f13b_s390x", "8Base-RHACM-2.5:rhacm2/acm-cluster-proxy-rhel8@sha256:a1c196b747624e5854f93f2575b4e909420277604196d1dfc832321b2a9fccc6_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:4888007361f4b04fea8df5f2acd610d15b7aad19822f9193cadcc36fea3271c9_s390x", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:a051fefa70c33ce608f540aa08296f013edcd1391d1334abed4d48a29dbf10e9_amd64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:cc7bbdc191ae6f6edffac7acbccfe5a998f583031564e544034253b74f5255f8_arm64", "8Base-RHACM-2.5:rhacm2/acm-governance-policy-addon-controller-rhel8@sha256:e5e429df456a4f67442852b2ec2535d12bf01008015f78729b64478b73a73a8c_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:48fe3ceb6445433c5b2e2e6c450c40cb1625a28a73385a799cfad235a0fe8a5b_s390x", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:90427b8c3d65c9e86f9d028f82465ab6545d0ce5504f7ea732d0df99a552983e_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:ba90df1dd10c9db92145111703096765cf94d2bcada5911cebb8b15fe5d72bf1_arm64", "8Base-RHACM-2.5:rhacm2/acm-grafana-rhel8@sha256:d2b420ce95e9b379ed5e02d966dbbba8bf8c551086f7cce1dbc51bb4364b4864_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:75a4563d8291173d10a675b4d23df4d3596be07e792c94249c1e769fd8c4a916_amd64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:b7b070d75e91fb3f42d5cea0b7c65c23bcba4c039b16b56e8e8c5d093df96124_s390x", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:c3676838f9b7fa509a3fd93c27ca1cf2235499cfe8b2432277b35825df1feb03_arm64", "8Base-RHACM-2.5:rhacm2/acm-must-gather-rhel8@sha256:d9566f7dc9a3afda4e048a518c1e8ffc3a1509a36348a16cfc9e16a81038124a_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:972a814a9c3277318bcc0280a17dd4c46db3a0df174484fed96e5fae9b4e3486_amd64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:9cc57201629e9454f0068a5e52de12e5174b7039d0af77010466d0a15e772dc1_arm64", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:b184a3b5f22d6201a20ef664334e01b24c7d9d444c594f4058746614bc7f8269_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-operator-bundle@sha256:c7bc5c548af389294dc2f9e5fc0f1c5735879da083119c4ca048ad01d6fd0702_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:0e33fb6df280efda4a4128bda577d3d0d2011238c4f2ef44b3d11ec5d8aa4a4f_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:1b62a3b52e0dab6fad8ee6e64fcd2d95da07f5c25f7683beb52a0e67b5e6d8c2_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:927f49fef14be90de2407952f3b98cb343eb7c6bf95139dbd5b3aff114eb4f48_arm64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-config-reloader-rhel8@sha256:dd76922aa861ca201422d0df111c7d2e5514d15cce3740a74c0894cf40f0d955_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:7c254aa1eae3534daad1fc7067be0648f38d0a86c2046f574eed202817912a82_ppc64le", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:9072ebc6cb499cc337b33525804b8fedd1967f96ac005f9fbeddfabfd67ce25b_amd64", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:c7fbdf9153e9b70954c349ce73ae53b7accef5fbd3cc448fb59c2bdfbc07d156_s390x", "8Base-RHACM-2.5:rhacm2/acm-prometheus-rhel8@sha256:fa6f648a76c68826b76d7e7843c6911b59655cacc35495e3911929fcda458aab_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:160a12fe6a27a34778fd2d75f096d0e13ba518ac459a8337bb87eef083759084_s390x", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:1fa06171917eb9a424fb611d476bc28eba5287264390955ec7b97cec222aedfa_arm64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:27855bbae98a3ec0a448899d22a31dcfca4d2d1c53ee1c227ef36cd1c6663c9a_amd64", "8Base-RHACM-2.5:rhacm2/acm-volsync-addon-controller-rhel8@sha256:67ba9cef857ead106942fb027eb6c4a6d95e36e6a894fb371fae9102f9038e47_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3991d48b2703404527135c6c52c1937df5cbc4524678f4ba86e495d8a8d22f3b_arm64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:3a341073fc0f313101aaad05d18da419aaa4b4a503e6f3fa7f813f90451ff053_amd64", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:68cc08440e9b8fbd3bd682cbc1447e9f32da6cd38d717d52a3972e22f363c641_ppc64le", "8Base-RHACM-2.5:rhacm2/cert-policy-controller-rhel8@sha256:758c591e4db9968f07a211668f4b56221bcf33fe87f5db68426efd2512462e5d_s390x", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:920be5006437616de975651f583e9bfafec0442b64c91c23f9e6e8893b1a1feb_arm64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:c75a7a73924c2dd9a08a630981bafdda5d3d1a1efef8ec49878be3e7ffbb6a5e_amd64", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:d063ac56be2d58015933a8a950673595436c40f9eecd23c2cdf2041276c94168_ppc64le", "8Base-RHACM-2.5:rhacm2/cluster-backup-rhel8-operator@sha256:daaf438a646ac2091acfb2db5457c97d530eb90ed6c16c985c04d592570074cd_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:349e1a5dab46e5c41d6f1778e25de51affde784bac0fe667d55cc36d7929640e_s390x", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:3c76e26142f433c49b14819e4b3bcb0b57ea365f2606a76aa84bfe59f0faf0e2_arm64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:e6d8cc28b61abbd2ba124b7b816fe86e29c8c3e1c6a59574038f767093df2e94_amd64", "8Base-RHACM-2.5:rhacm2/cluster-proxy-addon-rhel8@sha256:fa9ee8a6dada0561799dae5de46ab6e349d394a941b1d91852582afa70e77f09_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:56afa758e35b6b37ae793b6eb403acaae883f056e487da5b4814f6cca86bad52_s390x", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:875f760b87306a9436898a25c5a5b535c331324b369654f4f6b95bad78157227_arm64", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:d26babd626a5e6c040232e9d22d6d4df30e82ccca7d4d3a8627e74b947633ffe_ppc64le", "8Base-RHACM-2.5:rhacm2/config-policy-controller-rhel8@sha256:ffff9937ce2d6dc66204b8d86b0887db986a943c858490f1fe0a5a7655355487_amd64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:2c4a64cf092a5c31aa6533c643824a6ccec9b9271c440e23568960477d366583_s390x", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:394a6d04afd001172f22cb1852d292136eae264250058db6bbd59ba0918319ab_ppc64le", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:68aae939983596b5f85ba995a4747dde9c0ef511ed9f25f3638fdecde06f2d40_arm64", "8Base-RHACM-2.5:rhacm2/console-rhel8@sha256:a03f5c80684fabc27461dd5c5b6f9422c2522bed83ffc2d4184496a9a821e98d_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:4431a52ce6c3234be91aa26dedf37257003e627e17d34482b66be0450c12c3c8_amd64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:80513ae193c4858688293cc9a996f1858221d74abd6ee2626df3b367afe2dbcc_arm64", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:981409e4fe00c3b8ad4c695b671db00293e14449b8d29ec748e02893b0214a79_s390x", "8Base-RHACM-2.5:rhacm2/endpoint-monitoring-rhel8-operator@sha256:db3ccead74e71d604272cf1f337aa6d4825d934f71f0245418b784bb85b1bc9f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:11b1d134fe9a6c586e0accb514cd7eb2ee8985ad08b73f1f1ca69111a179c76a_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:2a4cb907dee17f96c941f982c1e86c54b23233d91a556398c57b0d9c40168039_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:89e6155fa145c24251323eb0fab580fc1657724d06ce691ab4e6a9c605d7b3ef_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-propagator-rhel8@sha256:ce4235e27cb08db6e4ce571d61614d3baa6c79c77fe36148db7e45159824d16a_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:08f30dfecf995288ba87e604e4f9172bdd04ea1e5a2dff52ea572b95b6b32be2_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:22918c2c4a7b57479239d57e2a29dc5693441cb9a9e606e82cbb25e2417c5d1f_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:a92943282791b24a8bd9b799d6f4bae9c5a0711e968a5da61caf0fbfa91fecfe_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-spec-sync-rhel8@sha256:b967180a85e1c5f86881dd6501afb5e6d35df278282842558a1ccd46072deeeb_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:8fb352c4509b4b79cc4afa43b93bb0fe6cbe37dd102f80158e583cf3020fe399_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:ace15d5307825d4073cc2fed31805e0e5a32123d7ac9a1cd736274d80c31ea82_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:b819d2293b043b622028e99e551d06b66fe870a566a091e78fd69188acc77537_amd64", "8Base-RHACM-2.5:rhacm2/governance-policy-status-sync-rhel8@sha256:c92a5cffa1a5695c1d78c58960e640416219b226d11d0685b8dc26ac25dc90a5_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:28454e1412126bdf3e674252c62c3c1acfa17ad6c67ce2a18cc3426f841e6f22_arm64", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:57465a7a98d9af5aa64b0ada661a6aadcf9746332e71344dfe897543e06c16d8_ppc64le", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:9ab41626362a349e3a103f3a176a37c372542913ca59668c66468233f5807637_s390x", "8Base-RHACM-2.5:rhacm2/governance-policy-template-sync-rhel8@sha256:c9cea7ce906545938be8f19923cc83f1fbc8dda472f8e2a2f910e2a28bd6b04f_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:3e19227f7f542e35fd6a8f11737113d29dad25235d9a5af905bfb63a79b8541c_ppc64le", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:8a622dd188ae660eb327e66659350bb8f73e5c0a4725e4d5fd270e592d6b4382_arm64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:a93a12d593289cc840c5543fe0740d726bd44a6a22c7315b6c9caa455e1d6194_amd64", "8Base-RHACM-2.5:rhacm2/grafana-dashboard-loader-rhel8@sha256:cdeb837e4fbf52ac7ddbce4781bd87677d58660a99134549d0ca20ad4549a02d_s390x", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:2d77445651714a529a6e331287d67307e1a9fb13843815f9617a890292a4a465_arm64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:530fa95b3254097e83767f29c275fac747d66ba5d164fbccf834883facc7b80b_ppc64le", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:af4307b2b3cce720ffe0b831f0c6120ec2ef8978603d65e5b0b444d57752601d_amd64", "8Base-RHACM-2.5:rhacm2/iam-policy-controller-rhel8@sha256:ca5aad603ec8af04a7573e0b8b886b2e9336f42c65321decb9f512efd3fc2db2_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:5ca7bbefee9e41e6789124bd70903c3cacd4f87a218692783070ceb8d57e31f6_arm64", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:7c99d33d6f7a6664e0c38a8544ad0148d4346c7ebd96f0f9366b598711f26056_s390x", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:9e1822312f8a2ec8981090459c52d31121f4df1b417b133abd9abdfe692619e6_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-client-rhel8@sha256:eb2b352d26fc7dfe69783f001c7de7991572d9c6ef2ef2bace2c032bcdeb0237_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:0f8f492341406c3d44b4cdb00d0d47ab90d0eb8dc477fcc5277a010434ab1c85_ppc64le", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:1f7915a77b79b9e328b56ff8a1bc77d93e0ff61cbbd7dc874af0affe37a8fbdd_amd64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:7f8be38d1de1e4fea9e61ae081372f31474164bf1ee480643414e4e2280bfa0c_arm64", "8Base-RHACM-2.5:rhacm2/insights-metrics-rhel8@sha256:ab9dddc3e680e0872a484821cf7b29e73b6f8777aad1a8992a35762f7c1e56c3_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:baafef7fe36f1b87ab6261f5a6fb56644d924e1d41a848ef50f8815efcc22e5d_arm64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:cf7430db7094c5bda32e51c369beff725b2e95af63bffbc3b53b36925a069646_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:d32cba72a9aab817529af2de6e09fce681bafd3e7a59b451e5d5214edfec3a6a_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-controller-rhel8@sha256:e1d707c2e01048888b28357707ad9024ea18c1a157377d333347743e3efdf7e0_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:13937d00110b989c55a94c452e6cfc6a1442150ebb575a89e4addbd9cc14d249_ppc64le", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:5eee0c89d80dbeea635f2d66c87ea6593b577ed961eb6b7560ad5912c1f5b445_amd64", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f1ce8866f4905f77c41607c56f4e71e2ab6e41b1463a19ded52d1c58f5f275ac_s390x", "8Base-RHACM-2.5:rhacm2/klusterlet-addon-rhel8-operator@sha256:f51ca77c0b2ba1a9f496272c2eaf634af4fca6d705d0da37e6fa29bd97939a7a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:7c70d6a12c588cff2a980b1672e21a4b48d8564f927e9fba39f98bc4204b0aa5_amd64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:b71c4605865ea5dc5553a4a4608ccf5a40dd6a5ef17f2267268dd3a6c03a6eb4_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:c2a4cb71a544f08287639e837bf8f467ee2f642df52347f24481e8eafa2f883a_arm64", "8Base-RHACM-2.5:rhacm2/kube-rbac-proxy-rhel8@sha256:fae3b748afcd75d883b837ace4099ff417b911ca8a6a78daaa8d6265bbbd1dd5_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:18ceca6d8f00cfeb84db4122219741ef7ec7470deb73e22f4c039ad1353f4258_s390x", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:289450bcaf6fa920bebc11d147af41036412ba7dbf2e1dfb0b963308cbe47971_ppc64le", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:331cac8053831627a6a6c43f4c4a7439124a57e254a7fdd399e44432502778df_arm64", "8Base-RHACM-2.5:rhacm2/kube-state-metrics-rhel8@sha256:3a3e446dcd7e934d29434853197c9d5781426a5f4823e181ad6a0037b03881bc_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:48618f18d959ec374569ccef987f86a844fce2d78f66fa6415d489d2cf4dda70_ppc64le", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:a7026201d4b07b6406b128443aefe3bcadca2410c16fb1345100dc50500669af_amd64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:b3ffb7389a34b7912d8d1b537478126dbcb9dbf4e047e94a213ea61967de7b4f_arm64", "8Base-RHACM-2.5:rhacm2/management-ingress-rhel8@sha256:d4d81507efa1dfdb9f9298a0e9a579ce62757fa020b9a23c0f00c3cf5a381cfe_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:4b039328d5acc27c2a60939979cf92522138215bb144a5e65b6dee5f8da2cb2c_amd64", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:52629f81d0cfa693e033fecc3f680527a484c14215781a3f3afbe83e08ff812e_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:a34725c44846aa734cfb07288db0cee25496578bb9e7c211603e7c7555aaebbb_s390x", "8Base-RHACM-2.5:rhacm2/memcached-exporter-rhel8@sha256:d1798c3b14891b4a4e8b5c4cdbac874c63db558864b7af4c78f833068fb4024e_arm64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4386a9d6536f1b6f676b5587a1f3e0522b97a2094c6dadc86200b09e3288bebc_amd64", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:4e4ba78b0301cbaf44aa5ecbc33832dbeba5bceeae283cc993e7fbf7252dbafd_s390x", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:93dd6e35ef4ed24de3855efd02b3b7e66364cf30e3db281b27573abd36e0dc5f_ppc64le", "8Base-RHACM-2.5:rhacm2/memcached-rhel8@sha256:de6d3b5f93eb87802ee12d6b2dcb85f3cea3a6bc803bd70c2757ac6a2b4a3de7_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:183acf7eaf078c89e977a5513c317cc6029b8d071012f4398d04c7af3570a9d0_s390x", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:8c4ca6137ecaab77452eb8e4b77105c572a42362efa66debb0d6dd2afb8ee801_arm64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:9be08803cc3171c8ddb1962f660a447ee51b0012bd821e1cc07b93485ef23cb6_amd64", "8Base-RHACM-2.5:rhacm2/metrics-collector-rhel8@sha256:d95663e244cb1b3b9ba79f73b26319cee9fcb7d3039f22f316accc725867d036_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:26b03b6c2fb4508acfd130f6fd4f6194b704b53b32a21f004949773cda8b6db5_s390x", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:28f48ea83dc105d8e6abfc77d2e15bc8d27a58fe3b2c95e16990446632fc8659_amd64", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:b0d59cb7c65b8c1790b83464cbdf9f8c87e53e6c896d5bfadf2c3e672095043e_ppc64le", "8Base-RHACM-2.5:rhacm2/multicloud-integrations-rhel8@sha256:f3b02515ed1dd18ef330b1335a6995d7b70b6baa761bea645de7d2a03b9c444e_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:6e37f1b151a27cc5f6b8dcd037194247eaa74189a3c5080c01efdf1cbc1787f2_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:b5a03735afa1992b87cb2cd8c655179cd33443fbeedf779c95ba2f78be121fac_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:d093d0f03081a319971516731ce678ba2c730d9a8d0fa256fbd0793e221e89a7_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-observability-rhel8-operator@sha256:e0a1a164c7c66599032d10af3ded9c0d23766fb26c5ab18c3ccada5d76fa7b39_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:28f27934b8d142429a4370ecb9af6fc96f72b7629b3d7adab5df61b9a9260a5e_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:2ce97891d158c71a86597c8209822a6bdd37186b11fb49324ef36bff3f8d0001_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:4afd20e21b82c7f64c23e99dd8c738cb92134799e5c7b766272c02ef5b5d5f74_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-application-rhel8@sha256:cd9285412224c61708794fb5e334055646fa3267b38a0b2156df8a69a0300049_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:07f3966149e88f99534fd5c618e758d1d9d3e54e4dfedcb8431ba0a9931ebe0f_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:aab45639e89399a29541f7c4311b83fef8a284b5fc970c17c40f6cce49f48672_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:ad9c3dac2f1625a27323358526a1faba78f24dd3e6b73963daade455c5de1d36_arm64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-channel-rhel8@sha256:edd8d1d209a5ab72b39f45e525c694fc4be4ac1d65721a2bf6fb8ff2c34bb03f_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:2a9cde81b90484afa429bb1c8d616299e44bcee99add3ecd06ed24e2220e2e11_amd64", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:3d331f88400639a0edcc03a06976849c2f8fea6a8b5443f1d840d94332dca1a1_ppc64le", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:a783efa14256d709d6947959e021caa3b77f9e3fd032491b3eee82ddd77fd7f3_s390x", "8Base-RHACM-2.5:rhacm2/multicluster-operators-subscription-rhel8@sha256:c98891a10126c532a3fa2ecfdda50cdf5c5e34371c5f4eec699071b626cf14c2_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:94ca5fb9dc78c9cc95aeb392c5bcff889939618071ad052aedca3df4aa778ee9_arm64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:e87e1f47454d3cb201235b3f70d7d9376e03abdf710b23cd58c1bbe1802ee00d_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:eacd86a7f7eac125ca1ebc4565df1865b11e98c3c9a2ed72db88ba97fac4c10c_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-repo-rhel8@sha256:f4941340502e1d9107fa359ea8360fec3fdfc5500d02a96cae86a0b866ea2d9b_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:24bea6ddc4ab98385503cbe1624ebc5d772c304e4f563259509169179580a456_amd64", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:57051dc94b48ef51535ebe4f682b70099474074878e02abedc4e58d58f5b304c_ppc64le", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:60cab5b2849dd4edb1153ac0ad70b60e76720807acdad1666dc73de2f8b48b6d_s390x", "8Base-RHACM-2.5:rhacm2/multiclusterhub-rhel8@sha256:6724440ea7e696c32713bc1b3fd1d3db7babc5fd91b56aa8f2f6f38d1211021b_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:d6df5485a88b349fc55da4cc8a14886d00d06d3cc3fa82430f9dcb9620218d55_arm64", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e2f4ea6307309bc4045b71478fecd82dfbe916eca8307fa1c9117fc4619d8721_ppc64le", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:e47e2c727a58c1788e35d1d2e3824309889634e099601c3dbfe244e129c5afb9_s390x", "8Base-RHACM-2.5:rhacm2/node-exporter-rhel8@sha256:f5b0430df60df6d349f5d373a4e6ad36489248a59e3de57d1402d09cc559a459_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:1b98132e495ab92e72b5991ed5b9ac010f94e7c36ec6955dc148a7df15aca7e6_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:2d9d9e524cf2cd7a01151cff901bc2c82bd0cd48fe6dafb169d26351299cc4c1_s390x", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:6745b86aab31cf661584c8bf0ba8ce7fbdbdc95418e656d36886d2b7ed3d9777_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8-operator@sha256:af6f1c1cd56270e00df2ed8f39e436bbca8e02702ce1007aa9658b781d592777_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:39df58cca5af21e76a21fe2e3493df5862e1f3674e95bd49d7c783b4b181a224_ppc64le", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:848b310ffcd7f46d36f32486d5fc4822087a13ab8df8cf6647d27a786da8ac11_amd64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:884481517ab6e5a7ff8623f3728f7aa1a6fc34e58470992f328f9ecf64ac4f23_arm64", "8Base-RHACM-2.5:rhacm2/observatorium-rhel8@sha256:dc30f80f004f12066acf081fc720ae3691be97ac59e7f5cc2f8857a43a43c7ca_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:1d0c3b52696937e5ffaca65670245a8294e36a0483ef98d28cc3b5d8c432e24b_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:69485cf4bbf197a85997aecc5aa0f3a9628975ba39b47d015cb8c9aa1bf61413_amd64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:722ddbf3d521a71399715ecb5fde536a36a2eab5f193c4d2d23507985649cdfc_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-alertmanager-rhel8@sha256:ebc80a46fc95f28ae004aa2acac62f95a2f8927c6ba98b3da26b53c86fa68a53_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:52d00120dc81625b0dd1005a652a89faded03b80c6255d4441a3f858bf335dbc_s390x", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:939c77c8550c7dd0c818ef3d0a0cf51c1e73c6e105de052d7c1ccf2e3cfe3129_arm64", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:dfa20597e866a8077461e6d2dd5d0ecf45ae6618726204fcd4e5714629c70de6_ppc64le", "8Base-RHACM-2.5:rhacm2/prometheus-rhel8@sha256:fe549f47764a2e175d0c408d2ed7e00df98a80aefd4c41d9f273d51f4e99e01c_amd64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:51c4c84f053b5e47bcd67637bcc37f555acde0a8630e85f2bb4f2d5910e011a4_s390x", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:8438ac436c841c844917028d98548b25a0072285eb0900f9b5ebd529e64d50e6_arm64", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:a9d5ca2f49df7bfdd2a0341e7a4cbc5df1290c39b05d0c8d638390e52befdbca_ppc64le", "8Base-RHACM-2.5:rhacm2/rbac-query-proxy-rhel8@sha256:bc43c1900c1b18e19fb2cee9eec5f05b49b24da5b1fe863d171bde4f321d4f81_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:2914c413c8af97ddc4830707f3b1be7490fe655466b37f9ea70170f9fdb44f2b_s390x", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:e70d5bbc7f36e14259e6dafee68e65b97d44120d91c23f883e959d75e0cabd48_amd64", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:f73ff5fa6c72201aa005c11353e888c47a553227086604c3ca93fa04cd7e9f6e_ppc64le", "8Base-RHACM-2.5:rhacm2/redisgraph-tls-rhel8@sha256:fa203541692a5b15883179fd23e47ffec2712e310cee269435608f8465130e03_arm64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:3d83c24eb53ce0a851401b8cdddf99d663eaabca2d393c7af1c5535d0143c892_ppc64le", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:52a3ed864ec978bfa6e6133304a7050933437f57fb935d093532986a3d02a648_s390x", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:762f26ade26d25c4aa507884f0e77e201e006fa3dbcef78aabf32594d756476f_amd64", "8Base-RHACM-2.5:rhacm2/search-aggregator-rhel8@sha256:e6b2e8bf24e9ff94b000f15e266ff8ec8953ab80b8544608fe604f7022cee5a0_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1631c133bb3fe21b4576191761cf0b3a8908a2b08d9edf7abcee319011d8e8db_s390x", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:1e72887e000772c858c57037c723bb838bfcb69ab85af1769b8ff565d4ccc86a_arm64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:620409338e5824a79ee894482a1b585778c67cd41010aad6ad3dc84483a27019_amd64", "8Base-RHACM-2.5:rhacm2/search-api-rhel8@sha256:ec7d941a84a16b7abdad0430f0f85096fcda35a5ab76f1d88cd162d0825a53a4_ppc64le", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:1fbd1325ca75fe8839955070215400a47ff1a4bae3f46db7348992cc67b75d83_s390x", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:8b56ddfebf92d34a91c3d58a28412da76e48454bcc5904e6a330fb175955b172_amd64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:927bac4e17b93155ed957073509966cc5ee3fae18a338855f237004ec2ba5c2e_arm64", "8Base-RHACM-2.5:rhacm2/search-collector-rhel8@sha256:a6b257eb6ed203e61f8afce48dc546f4113bd8bea149f440a3173d1713eef0e8_ppc64le", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:0d92eed2277972370b8974941f2f279db71c45c6bfa7d6c78dc9d141906ac9a3_arm64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:1e7fe3449270c44a16bc39fa1e7e16c20efa4920e86605e55230ce3293489fa2_s390x", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:77f9d18c9ae884927cda73355b640392889454c7c177ea747aec12d880793401_amd64", "8Base-RHACM-2.5:rhacm2/search-rhel8@sha256:fac9a3751edaebe775a2d616609b9019fe97c5f8504de8b6d4d3027622cd2e7c_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:5bce678eb05ecb00e955501f8e016b5c2cbf118a95986bfab83fb1ab354fee91_s390x", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:db923d7ec830fb111bc51abb49bd81ba2e4166e7009f6f50d19ba3b8e0a6a261_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f0514dba0a44df9e6d21496eae72d1bba8c4302789eeb61e9dbfd1c37a15b292_amd64", "8Base-RHACM-2.5:rhacm2/submariner-addon-rhel8@sha256:f755e969f52a4195a93b3a7bb1b6f8d57d5997cda430e2204f42f539b7fdc916_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:1c76075462e7108e513c49c6adb2a4f07ce8f9d784f3ea2acd146008ec92e6a2_amd64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:4e6079468b9422bd6ae0fa9cc8af3de85e4456e8bc808c2238b094a375225408_arm64", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:8a4c48da4c1303891ac8b9d2fd9170b85398703d1b85ebfbbac5bb81f2da9945_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-receive-controller-rhel8@sha256:f03f3f1ebb36412c5b5f08be91a96d0887a07a13156d37a157f36787f1269eaf_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:503796559e7d3fa21b3457e157ba60e6c42c915f72c0d947e2941f85570f5d4f_s390x", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:62376cf6af4c51bdfa0de60a5ad16dd8537fc082a4fd5ae96d176d3d8e5b94e0_ppc64le", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:9acbde5cfaf4cdb2973674f2fe22f2c005364c8d83c0a5f0feafaa8611f01133_arm64", "8Base-RHACM-2.5:rhacm2/thanos-rhel8@sha256:eca8ee30fa8944afed0311639669657b084268f2f94049913f48d8221960bcfa_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses" } ] }
rhsa-2022_1078
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1078", "url": "https://access.redhat.com/errata/RHSA-2022:1078" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1078.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:02+00:00", "generator": { "date": "2024-12-17T23:00:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1078", "initial_release_date": "2022-03-28T11:21:15+00:00", "revision_history": [ { "date": "2022-03-28T11:21:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T11:21:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-18.el7_6.src", "product": { "name": "openssl-1:1.0.2k-18.el7_6.src", "product_id": "openssl-1:1.0.2k-18.el7_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-18.el7_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-18.el7_6.x86_64", "product": { "name": "openssl-1:1.0.2k-18.el7_6.x86_64", "product_id": "openssl-1:1.0.2k-18.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-18.el7_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "product": { "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "product_id": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-18.el7_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "product": { "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "product_id": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-18.el7_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "product_id": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-18.el7_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "product": { "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "product_id": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-18.el7_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "product": { "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "product_id": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-18.el7_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.2k-18.el7_6.i686", "product": { "name": "openssl-devel-1:1.0.2k-18.el7_6.i686", "product_id": "openssl-devel-1:1.0.2k-18.el7_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-18.el7_6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-18.el7_6.i686", "product": { "name": "openssl-libs-1:1.0.2k-18.el7_6.i686", "product_id": "openssl-libs-1:1.0.2k-18.el7_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-18.el7_6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "product": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "product_id": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-18.el7_6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-18.el7_6.i686", "product": { "name": "openssl-static-1:1.0.2k-18.el7_6.i686", "product_id": "openssl-static-1:1.0.2k-18.el7_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-18.el7_6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "product": { "name": "openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "product_id": "openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-18.el7_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-18.el7_6.ppc64le", "product": { "name": "openssl-static-1:1.0.2k-18.el7_6.ppc64le", "product_id": "openssl-static-1:1.0.2k-18.el7_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-18.el7_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "product_id": "openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-18.el7_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.2k-18.el7_6.ppc64le", "product": { "name": "openssl-1:1.0.2k-18.el7_6.ppc64le", "product_id": "openssl-1:1.0.2k-18.el7_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-18.el7_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "product": { "name": "openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "product_id": "openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-18.el7_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "product": { "name": "openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "product_id": "openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-18.el7_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.src", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.src", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.src", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.src", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.src", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.i686", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-18.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-18.el7_6.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T11:21:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1078" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.AUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.AUS:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.E4S:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.ppc64le", "7Server-optional-7.6.E4S:openssl-static-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.src", "7Server-optional-7.6.TUS:openssl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-debuginfo-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-devel-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-libs-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-perl-1:1.0.2k-18.el7_6.x86_64", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.i686", "7Server-optional-7.6.TUS:openssl-static-1:1.0.2k-18.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_4896
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032)\n\n* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)\n\n* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes:\n\n* elfutils package has been update within RHV-H Channel to match the same version released in RHEL (BZ#2038081)\n\n* Rebase package(s) to version 1.2.24\nFor highlights, important fixes, or notable enhancements: see bugs in \"Depend On\". (BZ#2057338)\n\n* Rebase package(s) to version: 4.5.0\n\nHighlights, important fixes, or notable enhancements: (BZ#2057342)\n\n* Rebase package(s) to version anaconda-33.16.6.6-1.el8\nFor highlights and important bug fixes: include UI change for blocking installation if root password is not set. (BZ#1899821)\n\n* Red hat Virtualization Host has been rebased on Red Hat Enterprise Linux 8.6 (BZ#1997074)\n\n* Previously, concurrent executions of LV refresh (lvchange) failed. This hindered simultaneous starts of virtual machines that have thin-provisioned disks based on the same disk on a block storage domain.\nIn this release, concurrent execution of LV refresh has been fixed in LVM2. (BZ#2020497)\n\n* Red Hat Virtualization Host has been rebased on latest Ceph 4.3 (BZ#2090138)\n\n* In previous releases systemtap package could have been installed on top of RHV-H from RHV-H channel. With 4.4 SP1 systemtap package installation is not supported anymore (BZ#2052963)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:4896", "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1899821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899821" }, { "category": "external", "summary": "1997074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997074" }, { "category": "external", "summary": "2020497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020497" }, { "category": "external", "summary": "2027201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201" }, { "category": "external", "summary": "2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "2038081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038081" }, { "category": "external", "summary": "2052963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052963" }, { "category": "external", "summary": "2056334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056334" }, { "category": "external", "summary": "2056745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056745" }, { "category": "external", "summary": "2056830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830" }, { "category": "external", "summary": "2057338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057338" }, { "category": "external", "summary": "2057342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057342" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2067945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945" }, { "category": "external", "summary": "2073310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310" }, { "category": "external", "summary": "2081353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353" }, { "category": "external", "summary": "2086834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086834" }, { "category": "external", "summary": "2090138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090138" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4896.json" } ], "title": "Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]", "tracking": { "current_release_date": "2024-12-17T23:01:16+00:00", "generator": { "date": "2024-12-17T23:01:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:4896", "initial_release_date": "2022-06-03T13:51:08+00:00", "revision_history": [ { "date": "2022-06-03T13:51:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-06-03T13:51:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:01:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "elfutils-0:0.186-1.el8.src", "product": { "name": "elfutils-0:0.186-1.el8.src", "product_id": "elfutils-0:0.186-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils@0.186-1.el8?arch=src" } } }, { "category": "product_version", "name": "imgbased-0:1.2.24-1.el8ev.src", "product": { "name": "imgbased-0:1.2.24-1.el8ev.src", "product_id": "imgbased-0:1.2.24-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "product": { "name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "product": { "name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-node-ng-0:4.4.2-1.el8ev.src", "product": { "name": "ovirt-node-ng-0:4.4.2-1.el8ev.src", "product_id": "ovirt-node-ng-0:4.4.2-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng@4.4.2-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "product": { "name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "product_id": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.0-202205291010_8.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "elfutils-devel-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-devel-0:0.186-1.el8.x86_64", "product_id": "elfutils-devel-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-devel@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "product_id": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-debuginfod-client@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "elfutils-debugsource-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-debugsource-0:0.186-1.el8.x86_64", "product_id": "elfutils-debugsource-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-debugsource@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "elfutils-debuginfo-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-debuginfo-0:0.186-1.el8.x86_64", "product_id": "elfutils-debuginfo-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-debuginfo@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "product_id": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-debuginfod-client-debuginfo@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "product_id": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-debuginfod-debuginfo@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "product_id": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-libelf-debuginfo@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "product": { "name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "product_id": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/elfutils-libs-debuginfo@0.186-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64", "product": { "name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64", "product_id": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "product_id": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.0-5.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "product": { "name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "product_id": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.0-5.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "product": { "name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "product_id": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.0-202205291010_8.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "imgbased-0:1.2.24-1.el8ev.noarch", "product": { "name": "imgbased-0:1.2.24-1.el8ev.noarch", "product_id": "imgbased-0:1.2.24-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.2.24-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-imgbased-0:1.2.24-1.el8ev.noarch", "product": { "name": "python3-imgbased-0:1.2.24-1.el8ev.noarch", "product_id": "python3-imgbased-0:1.2.24-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-imgbased@1.2.24-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.0-5.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "product": { "name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "product_id": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "product": { "name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "product_id": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ovirt-node-ng-nodectl@4.4.2-1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "elfutils-0:0.186-1.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src" }, "product_reference": "elfutils-0:0.186-1.el8.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-debuginfo-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-debugsource-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-debugsource-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-devel-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-devel-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64" }, "product_reference": "elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src" }, "product_reference": "redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" }, "product_reference": "redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch" }, "product_reference": "imgbased-0:1.2.24-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.2.24-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src" }, "product_reference": "imgbased-0:1.2.24-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-0:4.4.2-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src" }, "product_reference": "ovirt-node-ng-0:4.4.2-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch" }, "product_reference": "ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-imgbased-0:1.2.24-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch" }, "product_reference": "python3-imgbased-0:1.2.24-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch" }, "product_reference": "python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src" }, "product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src" }, "product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" }, "product_reference": "redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-03-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067945" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "This bug was introduced in zlib v1.2.2.2 through zlib v1.2.11, with the addition of the Z_FIXED option, which forces the use of fixed Huffman codes, rather than dynamic Huffman codes, allowing for a simpler decoder for special applications.\n\nThis bug is difficult to trigger, as Z_FIXED is usually only used in special circumstances.\n\nRsync does the compression in-transit using zlib. As rsync uses vulnerable zlib v1.2.8 package, which incorrectly handles memory when performing certain zlib compressing or deflating operations. This results in rsync to crash.\n\nNote - The issue wasn\u0027t publicly labelled as security vulnerability until 2022, but the fix was public since 2018.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-25032" }, { "category": "external", "summary": "RHBZ#2067945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-25032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" } ], "release_date": "2018-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T13:51:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4896" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib: A flaw found in zlib when compressing (not decompressing) certain inputs" }, { "acknowledgments": [ { "names": [ "Hao Sun" ] } ], "cve": "CVE-2021-4028", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-11-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2027201" } ], "notes": [ { "category": "description", "text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in RDMA listen()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4028" }, { "category": "external", "summary": "RHBZ#2027201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4028" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74" }, { "category": "external", "summary": "https://lkml.org/lkml/2021/10/4/697", "url": "https://lkml.org/lkml/2021/10/4/697" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T13:51:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in RDMA listen()" }, { "cve": "CVE-2021-4083", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-12-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2029923" } ], "notes": [ { "category": "description", "text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fget: check that the fd still exists after getting a ref to it", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4083" }, { "category": "external", "summary": "RHBZ#2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9" } ], "release_date": "2021-12-03T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T13:51:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fget: check that the fd still exists after getting a ref to it" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T13:51:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-1271", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-04-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073310" } ], "notes": [ { "category": "description", "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "gzip: arbitrary-file-write vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This bug was introduced in gzip-1.3.10 and is relatively hard to exploit.\n\nRed Hat Enterprise Linux 6 was affected but Out of Support Cycle because gzip was not listed in Red Hat Enterprise Linux 6 ELS Inclusion List.\nhttps://access.redhat.com/articles/4997301", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1271" }, { "category": "external", "summary": "RHBZ#2073310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1271" } ], "release_date": "2022-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T13:51:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "workaround", "details": "Red Hat has investigated whether possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gzip: arbitrary-file-write vulnerability" }, { "acknowledgments": [ { "names": [ "Pieter Agten" ], "organization": "Fortanix" } ], "cve": "CVE-2022-24903", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2081353" } ], "notes": [ { "category": "description", "text": "A flaw was found in rsyslog\u0027s reception TCP modules. This flaw allows an attacker to craft a malicious message leading to a heap-based buffer overflow. This issue allows the attacker to corrupt or access data stored in memory, leading to a denial of service in the rsyslog or possible remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "rsyslog: Heap-based overflow in TCP syslog server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24903" }, { "category": "external", "summary": "RHBZ#2081353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24903", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24903" }, { "category": "external", "summary": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8", "url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8" } ], "release_date": "2022-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T13:51:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4896" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "rsyslog: Heap-based overflow in TCP syslog server" }, { "cve": "CVE-2022-25636", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-02-22T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056830" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap out of bounds write in nf_dup_netdev.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.3 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25636" }, { "category": "external", "summary": "RHBZ#2056830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056830" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25636", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25636" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/02/21/2", "url": "https://www.openwall.com/lists/oss-security/2022/02/21/2" } ], "release_date": "2022-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-03T13:51:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "workaround", "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit", "product_ids": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:elfutils-0:0.186-1.el8.src", "8Base-RHV-Hypervisor-4:elfutils-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-client-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debuginfod-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-debugsource-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-devel-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libelf-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:elfutils-libs-debuginfo-0:0.186-1.el8.x86_64", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.0-202205291010_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.0-202205291010_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.24-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-0:4.4.2-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.24-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:python3-ovirt-node-ng-nodectl-0:4.4.2-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.0-5.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.0-5.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap out of bounds write in nf_dup_netdev.c" } ] }
rhsa-2022_1082
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1082", "url": "https://access.redhat.com/errata/RHSA-2022:1082" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1082.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:55+00:00", "generator": { "date": "2024-12-17T23:00:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1082", "initial_release_date": "2022-03-28T13:53:56+00:00", "revision_history": [ { "date": "2022-03-28T13:53:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T13:53:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-62.el7_3.src", "product": { "name": "openssl-1:1.0.1e-62.el7_3.src", "product_id": "openssl-1:1.0.1e-62.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-62.el7_3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-62.el7_3.x86_64", "product": { "name": "openssl-1:1.0.1e-62.el7_3.x86_64", "product_id": "openssl-1:1.0.1e-62.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-62.el7_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-62.el7_3.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-62.el7_3.x86_64", "product_id": "openssl-devel-1:1.0.1e-62.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-62.el7_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-62.el7_3.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-62.el7_3.x86_64", "product_id": "openssl-libs-1:1.0.1e-62.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-62.el7_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-62.el7_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-62.el7_3.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-62.el7_3.x86_64", "product_id": "openssl-perl-1:1.0.1e-62.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-62.el7_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-62.el7_3.x86_64", "product": { "name": "openssl-static-1:1.0.1e-62.el7_3.x86_64", "product_id": "openssl-static-1:1.0.1e-62.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-62.el7_3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.1e-62.el7_3.i686", "product": { "name": "openssl-devel-1:1.0.1e-62.el7_3.i686", "product_id": "openssl-devel-1:1.0.1e-62.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-62.el7_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-62.el7_3.i686", "product": { "name": "openssl-libs-1:1.0.1e-62.el7_3.i686", "product_id": "openssl-libs-1:1.0.1e-62.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-62.el7_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "product_id": "openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-62.el7_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-62.el7_3.i686", "product": { "name": "openssl-static-1:1.0.1e-62.el7_3.i686", "product_id": "openssl-static-1:1.0.1e-62.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-62.el7_3?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-62.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src" }, "product_reference": "openssl-1:1.0.1e-62.el7_3.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-static-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-62.el7_3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src" }, "product_reference": "openssl-1:1.0.1e-62.el7_3.src", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-devel-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-libs-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-62.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686" }, "product_reference": "openssl-static-1:1.0.1e-62.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-62.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-62.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T13:53:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1082" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.src", "7Server-optional-7.3.AUS:openssl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-62.el7_3.x86_64", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.i686", "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-62.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1519
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Red Hat JBoss Web Server 5.6.2 packages are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.6.2 serves as a replacement for Red Hat JBoss Web Server 5.6.1. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1519", "url": "https://access.redhat.com/errata/RHSA-2022:1519" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1519.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.2 Security Update", "tracking": { "current_release_date": "2024-12-17T23:01:07+00:00", "generator": { "date": "2024-12-17T23:01:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1519", "initial_release_date": "2022-05-02T11:08:07+00:00", "revision_history": [ { "date": "2022-05-02T11:08:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-02T11:08:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:01:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.6 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "product": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "product_id": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-4.redhat_4.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "product": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "product_id": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-5.redhat_00007.1.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "product": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "product_id": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-4.redhat_4.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "product": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "product_id": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-5.redhat_00007.1.el8jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "product": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "product_id": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-4.redhat_4.el7jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "product": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "product_id": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-4.redhat_4.el7jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "product": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "product_id": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-4.redhat_4.el8jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "product": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "product_id": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-4.redhat_4.el8jws?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk11@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk8@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-5.redhat_00007.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-5.redhat_00007.1.el8jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src" }, "product_reference": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src" }, "product_reference": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64" }, "product_reference": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64" }, "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src" }, "product_reference": "jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src" }, "product_reference": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64" }, "product_reference": "jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64" }, "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-02T11:08:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1519" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-5.redhat_00007.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-4.redhat_4.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-5.redhat_00007.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-5.redhat_00007.1.el8jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1112
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1112", "url": "https://access.redhat.com/errata/RHSA-2022:1112" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1112.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:17+00:00", "generator": { "date": "2024-12-17T23:00:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1112", "initial_release_date": "2022-03-29T13:59:33+00:00", "revision_history": [ { "date": "2022-03-29T13:59:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-29T13:59:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-5.el8_1.1.src", "product": { "name": "openssl-1:1.1.1c-5.el8_1.1.src", "product_id": "openssl-1:1.1.1c-5.el8_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-5.el8_1.1.ppc64le", "product": { "name": "openssl-1:1.1.1c-5.el8_1.1.ppc64le", "product_id": "openssl-1:1.1.1c-5.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "product": { "name": "openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "product_id": "openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "product": { "name": "openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "product_id": "openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "product": { "name": "openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "product_id": "openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "product": { "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "product": { "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-5.el8_1.1.x86_64", "product": { "name": "openssl-1:1.1.1c-5.el8_1.1.x86_64", "product_id": "openssl-1:1.1.1c-5.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-5.el8_1.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "product": { "name": "openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "product_id": "openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "product": { "name": "openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "product_id": "openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-5.el8_1.1.x86_64", "product": { "name": "openssl-perl-1:1.1.1c-5.el8_1.1.x86_64", "product_id": "openssl-perl-1:1.1.1c-5.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-5.el8_1.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "product": { "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "product": { "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.1.1c-5.el8_1.1.i686", "product": { "name": "openssl-devel-1:1.1.1c-5.el8_1.1.i686", "product_id": "openssl-devel-1:1.1.1c-5.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-5.el8_1.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-5.el8_1.1.i686", "product": { "name": "openssl-libs-1:1.1.1c-5.el8_1.1.i686", "product_id": "openssl-libs-1:1.1.1c-5.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-5.el8_1.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "product": { "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "product_id": "openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-5.el8_1.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "product": { "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "product_id": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-5.el8_1.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "product_id": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-5.el8_1.1?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-5.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.ppc64le" }, "product_reference": "openssl-1:1.1.1c-5.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-5.el8_1.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.src" }, "product_reference": "openssl-1:1.1.1c-5.el8_1.1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-5.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.x86_64" }, "product_reference": "openssl-1:1.1.1c-5.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686" }, "product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.i686" }, "product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le" }, "product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64" }, "product_reference": "openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-5.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.i686" }, "product_reference": "openssl-devel-1:1.1.1c-5.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le" }, "product_reference": "openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-5.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.x86_64" }, "product_reference": "openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-5.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.i686" }, "product_reference": "openssl-libs-1:1.1.1c-5.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le" }, "product_reference": "openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-5.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.x86_64" }, "product_reference": "openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le" }, "product_reference": "openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-5.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.x86_64" }, "product_reference": "openssl-perl-1:1.1.1c-5.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.src", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T13:59:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.src", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1112" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.src", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.src", "BaseOS-8.1.0.Z.E4S:openssl-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-debugsource-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-devel-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.i686", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1c-5.el8_1.1.x86_64", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.E4S:openssl-perl-1:1.1.1c-5.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1263
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)\n\n* kernel: use-after-free in RDMA listen() (CVE-2021-4028)\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)\n\n* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)\n\n* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)\n\n* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)\n\n* expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution (CVE-2022-25236)\n\n* expat: Integer overflow in storeRawNames() (CVE-2022-25315)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHV-H has been rebased on RHEL-7.9.z #13 (BZ#2048409)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1263", "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2027201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201" }, { "category": "external", "summary": "2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "2041489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489" }, { "category": "external", "summary": "2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "external", "summary": "2048409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048409" }, { "category": "external", "summary": "2055326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326" }, { "category": "external", "summary": "2056363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363" }, { "category": "external", "summary": "2056366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366" }, { "category": "external", "summary": "2056370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1263.json" } ], "title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.22", "tracking": { "current_release_date": "2024-12-17T23:00:25+00:00", "generator": { "date": "2024-12-17T23:00:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1263", "initial_release_date": "2022-04-07T09:05:42+00:00", "revision_history": [ { "date": "2022-04-07T09:05:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-07T09:05:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "product": { "name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "product": { "name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "product": { "name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "product_id": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "product_id": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.22-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64", "product": { "name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64", "product_id": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.3.22-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.22-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.22-20220330.1.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src" }, "product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src" }, "product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src" }, "product_reference": "redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src" }, "product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" }, "product_reference": "redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031930" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in unix_dgram_recvmsg in net/unix/af_unix.c in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers. In this flaw, a missing cleanup may lead to a use-after-free due to a race problem. This flaw allows a local user to crash the system or escalate their privileges on the system.\r\n\r\nA read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "RHBZ#2031930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0920" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: Use After Free in unix_gc() which could result in a local privilege escalation" }, { "acknowledgments": [ { "names": [ "Hao Sun" ] } ], "cve": "CVE-2021-4028", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-11-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2027201" } ], "notes": [ { "category": "description", "text": "A flaw in the Linux kernel\u0027s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in RDMA listen()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4028" }, { "category": "external", "summary": "RHBZ#2027201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027201" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4028", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4028" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74" }, { "category": "external", "summary": "https://lkml.org/lkml/2021/10/4/697", "url": "https://lkml.org/lkml/2021/10/4/697" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in RDMA listen()" }, { "cve": "CVE-2021-4083", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-12-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2029923" } ], "notes": [ { "category": "description", "text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fget: check that the fd still exists after getting a ref to it", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4083" }, { "category": "external", "summary": "RHBZ#2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9" } ], "release_date": "2021-12-03T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fget: check that the fd still exists after getting a ref to it" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ], "organization": "Virtuozzo Kernel team" } ], "cve": "CVE-2021-4155", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2021-12-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034813" } ], "notes": [ { "category": "description", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "RHBZ#2034813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" } ], "release_date": "2022-01-10T06:36:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script (which resets \"0\" with XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6 ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6 ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL" }, { "cve": "CVE-2021-45417", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041489" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow vulnerability in the base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary code through large (\u003c16k) extended file attributes or ACL.", "title": "Vulnerability description" }, { "category": "summary", "text": "aide: heap-based buffer overflow on outputs larger than B64_BUF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45417" }, { "category": "external", "summary": "RHBZ#2041489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45417", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417" } ], "release_date": "2022-01-20T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "aide: heap-based buffer overflow on outputs larger than B64_BUF" }, { "cve": "CVE-2022-0330", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042404" } ], "notes": [ { "category": "description", "text": "A random memory access flaw was found in the Linux kernel\u2019s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible privileges escalation due to missing TLB flush", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux default configuration, the issue occurs only if a local user is running malicious code on GPU. The GPU is used and the user is required to have privileges to access the i915 Intel GPU.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "RHBZ#2042404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/25/12", "url": "https://www.openwall.com/lists/oss-security/2022/01/25/12" } ], "release_date": "2022-01-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: possible privileges escalation due to missing TLB flush" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22942", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044809" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: failing usercopy allows for use-after-free exploitation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "RHBZ#2044809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044809" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942" } ], "release_date": "2022-01-27T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module vmwgfx onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: failing usercopy allows for use-after-free exploitation" }, { "cve": "CVE-2022-24407", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-02-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2055326" } ], "notes": [ { "category": "description", "text": "A flaw was found in the SQL plugin shipped with Cyrus SASL. The vulnerability occurs due to failure to properly escape SQL input and leads to an improper input validation vulnerability. This flaw allows an attacker to execute arbitrary SQL commands and the ability to change the passwords for other accounts allowing escalation of privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24407" }, { "category": "external", "summary": "RHBZ#2055326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24407", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24407" }, { "category": "external", "summary": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28", "url": "https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28" } ], "release_date": "2022-02-22T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands" }, { "cve": "CVE-2022-25235", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "discovery_date": "2022-02-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056366" } ], "notes": [ { "category": "description", "text": "A flaw was found in expat. Passing malformed 2- and 3-byte UTF-8 sequences (for example, from start tag names) to the XML processing application on top of expat can lead to arbitrary code execution. This issue is dependent on how invalid UTF-8 is handled inside the XML processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25235" }, { "category": "external", "summary": "RHBZ#2056366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25235" }, { "category": "external", "summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/", "url": "https://blog.hartwork.org/posts/expat-2-4-5-released/" } ], "release_date": "2022-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution" }, { "cve": "CVE-2022-25236", "cwe": { "id": "CWE-179", "name": "Incorrect Behavior Order: Early Validation" }, "discovery_date": "2022-02-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056370" } ], "notes": [ { "category": "description", "text": "A flaw was found in expat. Passing one or more namespace separator characters in the \"xmlns[:prefix]\" attribute values made expat send malformed tag names to the XML processor on top of expat. This issue causes arbitrary code execution depending on how unexpected cases are handled inside the XML processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.\n\nThe xmlrpc-c component as shipped with Red Hat Enterprise Linux 8 is not affected by this issue as the issue could not be reproduced in this version.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25236" }, { "category": "external", "summary": "RHBZ#2056370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25236", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25236" }, { "category": "external", "summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/", "url": "https://blog.hartwork.org/posts/expat-2-4-5-released/" } ], "release_date": "2022-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution" }, { "cve": "CVE-2022-25315", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-02-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056363" } ], "notes": [ { "category": "description", "text": "An integer overflow was found in expat. The issue occurs in storeRawNames() by abusing the m_buffer expansion logic to allow allocations very close to INT_MAX and out-of-bounds heap writes. This flaw can cause a denial of service or potentially arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Integer overflow in storeRawNames()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that leverage expat to parse untrusted XML files. Applications that only parse trusted XML files or do not process XML files at all are not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25315" }, { "category": "external", "summary": "RHBZ#2056363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25315", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25315" }, { "category": "external", "summary": "https://blog.hartwork.org/posts/expat-2-4-5-released/", "url": "https://blog.hartwork.org/posts/expat-2-4-5-released/" } ], "release_date": "2022-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-07T09:05:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content. Please update the affected packages as soon as possible.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.22-1.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.22-20220330.1.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.22-20220330.1.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.22-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-productimg-0:4.3.22-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "expat: Integer overflow in storeRawNames()" } ] }
rhsa-2022_1066
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1066", "url": "https://access.redhat.com/errata/RHSA-2022:1066" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1066.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:40+00:00", "generator": { "date": "2024-12-17T23:00:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1066", "initial_release_date": "2022-03-28T11:07:03+00:00", "revision_history": [ { "date": "2022-03-28T11:07:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T11:07:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-25.el7_9.src", "product": { "name": "openssl-1:1.0.2k-25.el7_9.src", "product_id": "openssl-1:1.0.2k-25.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-25.el7_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-25.el7_9.x86_64", "product": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64", "product_id": "openssl-1:1.0.2k-25.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-25.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "product": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "product_id": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-25.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "product_id": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-25.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "product": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "product_id": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-25.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "product": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "product_id": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-25.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "product": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "product_id": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-25.el7_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:1.0.2k-25.el7_9.i686", "product": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686", "product_id": "openssl-libs-1:1.0.2k-25.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-25.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "product": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "product_id": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-25.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-25.el7_9.i686", "product": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686", "product_id": "openssl-devel-1:1.0.2k-25.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-25.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-25.el7_9.i686", "product": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686", "product_id": "openssl-static-1:1.0.2k-25.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-25.el7_9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-25.el7_9.ppc64le", "product": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le", "product_id": "openssl-1:1.0.2k-25.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-25.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "product": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "product_id": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-25.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "product": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "product_id": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-25.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "product_id": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-25.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "product": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "product_id": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-25.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "product": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "product_id": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-25.el7_9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-25.el7_9.ppc64", "product": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64", "product_id": "openssl-1:1.0.2k-25.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-25.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "product": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "product_id": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-25.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "product": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "product_id": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-25.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "product_id": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-25.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "product": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "product_id": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-25.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "product": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "product_id": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-25.el7_9?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "product": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "product_id": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-25.el7_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "product": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "product_id": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-25.el7_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "product": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "product_id": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-25.el7_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-25.el7_9.ppc", "product": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc", "product_id": "openssl-static-1:1.0.2k-25.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-25.el7_9?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-25.el7_9.s390x", "product": { "name": "openssl-1:1.0.2k-25.el7_9.s390x", "product_id": "openssl-1:1.0.2k-25.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-25.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "product": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "product_id": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-25.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "product": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "product_id": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-25.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "product": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "product_id": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-25.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "product": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "product_id": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-25.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-25.el7_9.s390x", "product": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x", "product_id": "openssl-static-1:1.0.2k-25.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-25.el7_9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.2k-25.el7_9.s390", "product": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390", "product_id": "openssl-devel-1:1.0.2k-25.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-25.el7_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-25.el7_9.s390", "product": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390", "product_id": "openssl-libs-1:1.0.2k-25.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-25.el7_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "product": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "product_id": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-25.el7_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-25.el7_9.s390", "product": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390", "product_id": "openssl-static-1:1.0.2k-25.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-25.el7_9?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-25.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-25.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T11:07:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1066" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Client-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Server-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.src", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-25.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-25.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1071
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1071", "url": "https://access.redhat.com/errata/RHSA-2022:1071" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1071.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:34+00:00", "generator": { "date": "2024-12-17T23:00:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1071", "initial_release_date": "2022-03-28T10:19:49+00:00", "revision_history": [ { "date": "2022-03-28T10:19:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:19:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1g-16.el8_4.src", "product": { "name": "openssl-1:1.1.1g-16.el8_4.src", "product_id": "openssl-1:1.1.1g-16.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1g-16.el8_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1g-16.el8_4.aarch64", "product": { "name": "openssl-1:1.1.1g-16.el8_4.aarch64", "product_id": "openssl-1:1.1.1g-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1g-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1g-16.el8_4.aarch64", "product": { "name": "openssl-devel-1:1.1.1g-16.el8_4.aarch64", "product_id": "openssl-devel-1:1.1.1g-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1g-16.el8_4.aarch64", "product": { "name": "openssl-libs-1:1.1.1g-16.el8_4.aarch64", "product_id": "openssl-libs-1:1.1.1g-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1g-16.el8_4.aarch64", "product": { "name": "openssl-perl-1:1.1.1g-16.el8_4.aarch64", "product_id": "openssl-perl-1:1.1.1g-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "product": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "product_id": "openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "product": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "product_id": "openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "product_id": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-16.el8_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1g-16.el8_4.ppc64le", "product": { "name": "openssl-1:1.1.1g-16.el8_4.ppc64le", "product_id": "openssl-1:1.1.1g-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1g-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "product": { "name": "openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "product_id": "openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "product": { "name": "openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "product_id": "openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "product": { "name": "openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "product_id": "openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "product": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "product_id": "openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "product": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "product_id": "openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "product_id": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-16.el8_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1g-16.el8_4.x86_64", "product": { "name": "openssl-1:1.1.1g-16.el8_4.x86_64", "product_id": "openssl-1:1.1.1g-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1g-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1g-16.el8_4.x86_64", "product": { "name": "openssl-devel-1:1.1.1g-16.el8_4.x86_64", "product_id": "openssl-devel-1:1.1.1g-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1g-16.el8_4.x86_64", "product": { "name": "openssl-libs-1:1.1.1g-16.el8_4.x86_64", "product_id": "openssl-libs-1:1.1.1g-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1g-16.el8_4.x86_64", "product": { "name": "openssl-perl-1:1.1.1g-16.el8_4.x86_64", "product_id": "openssl-perl-1:1.1.1g-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "product": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "product_id": "openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "product": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "product_id": "openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "product_id": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-16.el8_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.1.1g-16.el8_4.i686", "product": { "name": "openssl-devel-1:1.1.1g-16.el8_4.i686", "product_id": "openssl-devel-1:1.1.1g-16.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-16.el8_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1g-16.el8_4.i686", "product": { "name": "openssl-libs-1:1.1.1g-16.el8_4.i686", "product_id": "openssl-libs-1:1.1.1g-16.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-16.el8_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1g-16.el8_4.i686", "product": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.i686", "product_id": "openssl-debugsource-1:1.1.1g-16.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-16.el8_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "product": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "product_id": "openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-16.el8_4?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "product": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "product_id": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-16.el8_4?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1g-16.el8_4.s390x", "product": { "name": "openssl-1:1.1.1g-16.el8_4.s390x", "product_id": "openssl-1:1.1.1g-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1g-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1g-16.el8_4.s390x", "product": { "name": "openssl-devel-1:1.1.1g-16.el8_4.s390x", "product_id": "openssl-devel-1:1.1.1g-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1g-16.el8_4.s390x", "product": { "name": "openssl-libs-1:1.1.1g-16.el8_4.s390x", "product_id": "openssl-libs-1:1.1.1g-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1g-16.el8_4.s390x", "product": { "name": "openssl-perl-1:1.1.1g-16.el8_4.s390x", "product_id": "openssl-perl-1:1.1.1g-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "product": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "product_id": "openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "product": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "product_id": "openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "product": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "product_id": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-16.el8_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1g-16.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.aarch64" }, "product_reference": "openssl-1:1.1.1g-16.el8_4.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1g-16.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.ppc64le" }, "product_reference": "openssl-1:1.1.1g-16.el8_4.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1g-16.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.s390x" }, "product_reference": "openssl-1:1.1.1g-16.el8_4.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1g-16.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.src" }, "product_reference": "openssl-1:1.1.1g-16.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1g-16.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.x86_64" }, "product_reference": "openssl-1:1.1.1g-16.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64" }, "product_reference": "openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.i686" }, "product_reference": "openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.s390x" }, "product_reference": "openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64" }, "product_reference": "openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.aarch64" }, "product_reference": "openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.i686" }, "product_reference": "openssl-debugsource-1:1.1.1g-16.el8_4.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le" }, "product_reference": "openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.s390x" }, "product_reference": "openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1g-16.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.x86_64" }, "product_reference": "openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1g-16.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.aarch64" }, "product_reference": "openssl-devel-1:1.1.1g-16.el8_4.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1g-16.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.i686" }, "product_reference": "openssl-devel-1:1.1.1g-16.el8_4.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1g-16.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.ppc64le" }, "product_reference": "openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1g-16.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.s390x" }, "product_reference": "openssl-devel-1:1.1.1g-16.el8_4.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1g-16.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.x86_64" }, "product_reference": "openssl-devel-1:1.1.1g-16.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1g-16.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.aarch64" }, "product_reference": "openssl-libs-1:1.1.1g-16.el8_4.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1g-16.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.i686" }, "product_reference": "openssl-libs-1:1.1.1g-16.el8_4.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1g-16.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.ppc64le" }, "product_reference": "openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1g-16.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.s390x" }, "product_reference": "openssl-libs-1:1.1.1g-16.el8_4.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1g-16.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.x86_64" }, "product_reference": "openssl-libs-1:1.1.1g-16.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1g-16.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.aarch64" }, "product_reference": "openssl-perl-1:1.1.1g-16.el8_4.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1g-16.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.ppc64le" }, "product_reference": "openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1g-16.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.s390x" }, "product_reference": "openssl-perl-1:1.1.1g-16.el8_4.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1g-16.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.x86_64" }, "product_reference": "openssl-perl-1:1.1.1g-16.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.src", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:19:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.src", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1071" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.src", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.src", "BaseOS-8.4.0.Z.EUS:openssl-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-debugsource-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-devel-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.i686", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1g-16.el8_4.x86_64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.aarch64", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.ppc64le", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.s390x", "BaseOS-8.4.0.Z.EUS:openssl-perl-1:1.1.1g-16.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1073
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1073", "url": "https://access.redhat.com/errata/RHSA-2022:1073" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1073.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:18+00:00", "generator": { "date": "2024-12-17T23:00:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1073", "initial_release_date": "2022-03-28T10:00:29+00:00", "revision_history": [ { "date": "2022-03-28T10:00:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:00:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-60.el6_10.src", "product": { "name": "openssl-0:1.0.1e-60.el6_10.src", "product_id": "openssl-0:1.0.1e-60.el6_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el6_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-60.el6_10.s390", "product": { "name": "openssl-0:1.0.1e-60.el6_10.s390", "product_id": "openssl-0:1.0.1e-60.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el6_10?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-60.el6_10.s390", "product": { "name": "openssl-devel-0:1.0.1e-60.el6_10.s390", "product_id": "openssl-devel-0:1.0.1e-60.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el6_10?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "product_id": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el6_10?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-60.el6_10.s390x", "product": { "name": "openssl-0:1.0.1e-60.el6_10.s390x", "product_id": "openssl-0:1.0.1e-60.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-60.el6_10.s390x", "product": { "name": "openssl-devel-0:1.0.1e-60.el6_10.s390x", "product_id": "openssl-devel-0:1.0.1e-60.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-60.el6_10.s390x", "product": { "name": "openssl-perl-0:1.0.1e-60.el6_10.s390x", "product_id": "openssl-perl-0:1.0.1e-60.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-60.el6_10.s390x", "product": { "name": "openssl-static-0:1.0.1e-60.el6_10.s390x", "product_id": "openssl-static-0:1.0.1e-60.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el6_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-60.el6_10.x86_64", "product": { "name": "openssl-0:1.0.1e-60.el6_10.x86_64", "product_id": "openssl-0:1.0.1e-60.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-60.el6_10.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-60.el6_10.x86_64", "product_id": "openssl-devel-0:1.0.1e-60.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-60.el6_10.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-60.el6_10.x86_64", "product_id": "openssl-perl-0:1.0.1e-60.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-60.el6_10.x86_64", "product": { "name": "openssl-static-0:1.0.1e-60.el6_10.x86_64", "product_id": "openssl-static-0:1.0.1e-60.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-60.el6_10.i686", "product": { "name": "openssl-0:1.0.1e-60.el6_10.i686", "product_id": "openssl-0:1.0.1e-60.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el6_10?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-60.el6_10.i686", "product": { "name": "openssl-devel-0:1.0.1e-60.el6_10.i686", "product_id": "openssl-devel-0:1.0.1e-60.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el6_10?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "product_id": "openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el6_10?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-60.el6_10.i686", "product": { "name": "openssl-perl-0:1.0.1e-60.el6_10.i686", "product_id": "openssl-perl-0:1.0.1e-60.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el6_10?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-60.el6_10.i686", "product": { "name": "openssl-static-0:1.0.1e-60.el6_10.i686", "product_id": "openssl-static-0:1.0.1e-60.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-0:1.0.1e-60.el6_10.src" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.src", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-perl-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-static-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-static-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.s390", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.src" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.src", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.s390", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-perl-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-60.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.i686" }, "product_reference": "openssl-static-0:1.0.1e-60.el6_10.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-60.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x" }, "product_reference": "openssl-static-0:1.0.1e-60.el6_10.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-60.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-60.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:00:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Server-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1073" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "6Server-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.src", "6Server-optional-ELS:openssl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-devel-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-perl-0:1.0.1e-60.el6_10.x86_64", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.i686", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.s390x", "6Server-optional-ELS:openssl-static-0:1.0.1e-60.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1065
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1065", "url": "https://access.redhat.com/errata/RHSA-2022:1065" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1065.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:00:10+00:00", "generator": { "date": "2024-12-17T23:00:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1065", "initial_release_date": "2022-03-28T08:47:11+00:00", "revision_history": [ { "date": "2022-03-28T08:47:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T08:47:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-6.el8_5.src", "product": { "name": "openssl-1:1.1.1k-6.el8_5.src", "product_id": "openssl-1:1.1.1k-6.el8_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-6.el8_5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-6.el8_5.aarch64", "product": { "name": "openssl-1:1.1.1k-6.el8_5.aarch64", "product_id": "openssl-1:1.1.1k-6.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-6.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-6.el8_5.aarch64", "product": { "name": "openssl-devel-1:1.1.1k-6.el8_5.aarch64", "product_id": "openssl-devel-1:1.1.1k-6.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-6.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-6.el8_5.aarch64", "product": { "name": "openssl-libs-1:1.1.1k-6.el8_5.aarch64", "product_id": "openssl-libs-1:1.1.1k-6.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-6.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-6.el8_5.aarch64", "product": { "name": "openssl-perl-1:1.1.1k-6.el8_5.aarch64", "product_id": "openssl-perl-1:1.1.1k-6.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-6.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "product": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "product_id": "openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-6.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "product": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "product_id": "openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-6.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "product_id": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-6.el8_5?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-6.el8_5.ppc64le", "product": { "name": "openssl-1:1.1.1k-6.el8_5.ppc64le", "product_id": "openssl-1:1.1.1k-6.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-6.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "product": { "name": "openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "product_id": "openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-6.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "product": { "name": "openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "product_id": "openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-6.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "product": { "name": "openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "product_id": "openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-6.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "product": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "product_id": "openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-6.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "product": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "product_id": "openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-6.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "product_id": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-6.el8_5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-6.el8_5.x86_64", "product": { "name": "openssl-1:1.1.1k-6.el8_5.x86_64", "product_id": "openssl-1:1.1.1k-6.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-6.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-6.el8_5.x86_64", "product": { "name": "openssl-devel-1:1.1.1k-6.el8_5.x86_64", "product_id": "openssl-devel-1:1.1.1k-6.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-6.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-6.el8_5.x86_64", "product": { "name": "openssl-libs-1:1.1.1k-6.el8_5.x86_64", "product_id": "openssl-libs-1:1.1.1k-6.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-6.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-6.el8_5.x86_64", "product": { "name": "openssl-perl-1:1.1.1k-6.el8_5.x86_64", "product_id": "openssl-perl-1:1.1.1k-6.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-6.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "product": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "product_id": "openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-6.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "product": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "product_id": "openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-6.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "product_id": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-6.el8_5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.1.1k-6.el8_5.i686", "product": { "name": "openssl-devel-1:1.1.1k-6.el8_5.i686", "product_id": "openssl-devel-1:1.1.1k-6.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-6.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-6.el8_5.i686", "product": { "name": "openssl-libs-1:1.1.1k-6.el8_5.i686", "product_id": "openssl-libs-1:1.1.1k-6.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-6.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-6.el8_5.i686", "product": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.i686", "product_id": "openssl-debugsource-1:1.1.1k-6.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-6.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "product": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "product_id": "openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-6.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "product_id": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-6.el8_5?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-6.el8_5.s390x", "product": { "name": "openssl-1:1.1.1k-6.el8_5.s390x", "product_id": "openssl-1:1.1.1k-6.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-6.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-6.el8_5.s390x", "product": { "name": "openssl-devel-1:1.1.1k-6.el8_5.s390x", "product_id": "openssl-devel-1:1.1.1k-6.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-6.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-6.el8_5.s390x", "product": { "name": "openssl-libs-1:1.1.1k-6.el8_5.s390x", "product_id": "openssl-libs-1:1.1.1k-6.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-6.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-6.el8_5.s390x", "product": { "name": "openssl-perl-1:1.1.1k-6.el8_5.s390x", "product_id": "openssl-perl-1:1.1.1k-6.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-6.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "product": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "product_id": "openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-6.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "product": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "product_id": "openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-6.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "product_id": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-6.el8_5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-6.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.aarch64" }, "product_reference": "openssl-1:1.1.1k-6.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-6.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.ppc64le" }, "product_reference": "openssl-1:1.1.1k-6.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-6.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.s390x" }, "product_reference": "openssl-1:1.1.1k-6.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-6.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.src" }, "product_reference": "openssl-1:1.1.1k-6.el8_5.src", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-6.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.x86_64" }, "product_reference": "openssl-1:1.1.1k-6.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64" }, "product_reference": "openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.i686" }, "product_reference": "openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.s390x" }, "product_reference": "openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.aarch64" }, "product_reference": "openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.i686" }, "product_reference": "openssl-debugsource-1:1.1.1k-6.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le" }, "product_reference": "openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.s390x" }, "product_reference": "openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-6.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.x86_64" }, "product_reference": "openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-6.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.aarch64" }, "product_reference": "openssl-devel-1:1.1.1k-6.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-6.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.i686" }, "product_reference": "openssl-devel-1:1.1.1k-6.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-6.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.ppc64le" }, "product_reference": "openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-6.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.s390x" }, "product_reference": "openssl-devel-1:1.1.1k-6.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-6.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.x86_64" }, "product_reference": "openssl-devel-1:1.1.1k-6.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-6.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.aarch64" }, "product_reference": "openssl-libs-1:1.1.1k-6.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-6.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.i686" }, "product_reference": "openssl-libs-1:1.1.1k-6.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-6.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.ppc64le" }, "product_reference": "openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-6.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.s390x" }, "product_reference": "openssl-libs-1:1.1.1k-6.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-6.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.x86_64" }, "product_reference": "openssl-libs-1:1.1.1k-6.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-6.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.aarch64" }, "product_reference": "openssl-perl-1:1.1.1k-6.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-6.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.ppc64le" }, "product_reference": "openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-6.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.s390x" }, "product_reference": "openssl-perl-1:1.1.1k-6.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-6.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.x86_64" }, "product_reference": "openssl-perl-1:1.1.1k-6.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.src", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T08:47:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.src", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1065" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.src", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.src", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-6.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-6.el8_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1476
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.3 General Availability release images. This update provides security fixes, bug fixes, and updates the container images.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.3 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide some security fixes and bug fixes. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/\n\nSecurity updates:\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* nats-server: misusing the \"dynamically provisioned sandbox accounts\" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450)\n\n* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)\n\n* nodejs-shelljs: improper privilege management (CVE-2022-0144)\n\n* search-ui-container: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\n* imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path (CVE-2022-24778)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\n* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)\n\nRelated bugs:\n\n* RHACM 2.4.3 image files (BZ #2057249)\n\n* Observability - dashboard name contains `/` would cause error when generating dashboard cm (BZ #2032128)\n\n* ACM application placement fails after renaming the application name (BZ #2033051)\n\n* Disable the obs metric collect should not impact the managed cluster upgrade (BZ #2039197)\n\n* Observability - cluster list should only contain OCP311 cluster on OCP311 dashboard (BZ #2039820)\n\n* The value of name label changed from clusterclaim name to cluster name (BZ #2042223)\n\n* VMWare Cluster creation does not accept ecdsa-sha2-nistp521 ssh keys (BZ #2048500)\n\n* clusterSelector matchLabels spec are cleared when changing app name/namespace during creating an app in UI (BZ #2053211)\n\n* Application cluster status is not updated in UI after restoring (BZ #2053279)\n\n* OpenStack cluster creation is using deprecated floating IP config for 4.7+ (BZ #2056610)\n\n* The value of Vendor reported by cluster metrics was Other even if the vendor label in managedcluster was Openshift (BZ #2059039)\n\n* Subscriptions stop reconciling after channel secrets are recreated (BZ #2059954)\n\n* Placementrule is not reconciling on a new fresh environment (BZ #2074156)\n\n* The cluster claimed from clusterpool cannot auto imported (BZ #2074543)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1476", "url": "https://access.redhat.com/errata/RHSA-2022:1476" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing" }, { "category": "external", "summary": "2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "2032128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032128" }, { "category": "external", "summary": "2033051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033051" }, { "category": "external", "summary": "2039197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039197" }, { "category": "external", "summary": "2039820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039820" }, { "category": "external", "summary": "2042223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042223" }, { "category": "external", "summary": "2043535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043535" }, { "category": "external", "summary": "2044556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044556" }, { "category": "external", "summary": "2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "2048500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048500" }, { "category": "external", "summary": "2050853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050853" }, { "category": "external", "summary": "2052573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052573" }, { "category": "external", "summary": "2053211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053211" }, { "category": "external", "summary": "2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "2053279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053279" }, { "category": "external", "summary": "2056610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056610" }, { "category": "external", "summary": "2057249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057249" }, { "category": "external", "summary": "2059039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059039" }, { "category": "external", "summary": "2059954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059954" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2069368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069368" }, { "category": "external", "summary": "2074156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074156" }, { "category": "external", "summary": "2074543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074543" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1476.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes", "tracking": { "current_release_date": "2024-12-17T23:00:48+00:00", "generator": { "date": "2024-12-17T23:00:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1476", "initial_release_date": "2022-04-21T02:42:32+00:00", "revision_history": [ { "date": "2022-04-21T02:42:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-21T02:42:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.3-36" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.3-11" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.3-10" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "product_id": "rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.3-13" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.3-9" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.3-12" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.3-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.3-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "product_id": "rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "product_id": "rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.3-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "product_id": "rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "product": { "name": "rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "product_id": "rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "product_id": "rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.3-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.3-36" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "product": { "name": "rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "product_id": "rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.3-11" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "product": { "name": "rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "product_id": "rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.3-10" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "product_id": "rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.3-13" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "product_id": "rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.3-9" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "product_id": "rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.3-12" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.3-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.3-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "product_id": "rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "product": { "name": "rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "product_id": "rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "product_id": "rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "product": { "name": "rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "product_id": "rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.3-8" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "product_id": "rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "product": { "name": "rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "product_id": "rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "product": { "name": "rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "product_id": "rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x", "product_id": "rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.3-3" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.3-36" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.3-11" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.3-10" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.3-13" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.3-9" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.3-12" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.3-9" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.3-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.3-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.3-5" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "product": { "name": "rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "product_id": "rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.3-3" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.3-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.3-3" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x" }, "product_reference": "rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x" }, "product_reference": "rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64" }, "product_reference": "rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x" }, "product_reference": "rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le" }, "product_reference": "rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23518", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044654" } ], "notes": [ { "category": "description", "text": "A prototype pollution vulnerability was discovered in cached-path-relative. This flaw allows a remote, unauthenticated attacker to inject a cache variable to leak sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "cached-path-relative: Prototype Pollution via the cache variable", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23518" }, { "category": "external", "summary": "RHBZ#2044654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23518" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cached-path-relative: Prototype Pollution via the cache variable" }, { "cve": "CVE-2021-23566", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050853" } ], "notes": [ { "category": "description", "text": "A flaw was found in the nanoid library where the valueOf() function allows the reproduction of the last id generated. This flaw allows an attacker to expose sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "nanoid: Information disclosure via valueOf() function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23566" }, { "category": "external", "summary": "RHBZ#2050853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050853" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23566", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23566" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qrpm-p2h7-hrv2", "url": "https://github.com/advisories/GHSA-qrpm-p2h7-hrv2" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nanoid: Information disclosure via valueOf() function" }, { "cve": "CVE-2021-41190", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024938" } ], "notes": [ { "category": "description", "text": "The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Image Specification, the manifest and index documents were not self-describing and documents with a single digest could be interpreted as either a manifest or an index. In the OCI Image Specification version 1.0.1 there is specified a recommendation that both manifest and index documents contain a `mediaType` field to identify the type of document.", "title": "Vulnerability description" }, { "category": "summary", "text": "opencontainers: OCI manifest and index parsing confusion", "title": "Vulnerability summary" }, { "category": "other", "text": "As a consequence of the OCI Image Specification (and OCI Distribution Specification [1]), container runtime engines (like containerd, moby - Docker Engine, cri-o) deliver updates to adopt new `mediaType` field used for identification of the document type. Even though some Red Hat products rely on container engine, the impact by this issue is LOW.\n\n[1] https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41190" }, { "category": "external", "summary": "RHBZ#2024938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024938" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41190" }, { "category": "external", "summary": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42", "url": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42" }, { "category": "external", "summary": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m", "url": "https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m" }, { "category": "external", "summary": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh", "url": "https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh" } ], "release_date": "2021-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "opencontainers: OCI manifest and index parsing confusion" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2022-0144", "discovery_date": "2022-01-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2043535" } ], "notes": [ { "category": "description", "text": "A flaw was found in the ShellJS library when the scripts used the exec function. Local users on the filesystem could take advantage of this as they can read the stdout of the ShellJS process. This issue discloses sensitive information, leading to privilege escalation. This flaw allows an attacker to craft stdout files, which leads to crashing the ShellJS scripts running with privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-shelljs: improper privilege management", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Virtualization, ShellJSis a development dependency of ovirt-engine-ui-extensions and ovirt-web-ui. Vulnerable ShellJS code is not shipped with the product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0144" }, { "category": "external", "summary": "RHBZ#2043535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043535" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0144", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0144" }, { "category": "external", "summary": "https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/", "url": "https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/" } ], "release_date": "2021-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-shelljs: improper privilege management" }, { "cve": "CVE-2022-0155", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2021-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044556" } ], "notes": [ { "category": "description", "text": "A flaw was found in follow-redirects when fetching a remote URL with a cookie when it gets to the Location response header. This flaw allows an attacker to hijack the account as the cookie is leaked.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0155" }, { "category": "external", "summary": "RHBZ#2044556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044556" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0155", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0155" }, { "category": "external", "summary": "https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/", "url": "https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/" } ], "release_date": "2022-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor" }, { "cve": "CVE-2022-0235", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2022-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044591" } ], "notes": [ { "category": "description", "text": "A flaw was found in node-fetch. When following a redirect to a third-party domain, node-fetch was forwarding sensitive headers such as \"Authorization,\" \"WWW-Authenticate,\" and \"Cookie\" to potentially untrusted targets. This flaw leads to the exposure of sensitive information to an unauthorized actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-fetch: exposure of sensitive information to an unauthorized actor", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0. For more information about Dotnet product support scope, please see https://access.redhat.com/support/policy/updates/net-core", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0235" }, { "category": "external", "summary": "RHBZ#2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" }, { "category": "external", "summary": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/", "url": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-fetch: exposure of sensitive information to an unauthorized actor" }, { "cve": "CVE-2022-0536", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053259" } ], "notes": [ { "category": "description", "text": "A flaw was found in the follow-redirects package. This flaw allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol. This issue happens with an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle (MITM) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0536" }, { "category": "external", "summary": "RHBZ#2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-24450", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2052573" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NATS nats-server in an experimental feature that provides dynamically provisioned sandbox accounts that do not check the clients\u2019 authorization. This flaw allows an attacker to take advantage of its valid account and switch over to another existing account without further authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "nats-server: misusing the \"dynamically provisioned sandbox accounts\" feature authenticated user can obtain the privileges of the System account", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24450" }, { "category": "external", "summary": "RHBZ#2052573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24450" }, { "category": "external", "summary": "https://advisories.nats.io/CVE/CVE-2022-24450.txt", "url": "https://advisories.nats.io/CVE/CVE-2022-24450.txt" } ], "release_date": "2022-02-07T12:40:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nats-server: misusing the \"dynamically provisioned sandbox accounts\" feature authenticated user can obtain the privileges of the System account" }, { "cve": "CVE-2022-24778", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2022-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2069368" } ], "notes": [ { "category": "description", "text": "A flaw was found in the imgcrypt library when checking the keys of an authorized user to access an encrypted image on systems where layers are not available and cannot run on the host architecture. This flaw allows an attacker to run an image without providing the previously decrypted keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path", "title": "Vulnerability summary" }, { "category": "other", "text": "Only Fedora is using the affected codebase. Hence, marking other products as of Low impact as they are using an affected version of \u0027imgcrypt\u0027 as a transitive dependency.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24778" }, { "category": "external", "summary": "RHBZ#2069368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24778" }, { "category": "external", "summary": "https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm", "url": "https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm" } ], "release_date": "2022-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-21T02:42:32+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for important\ninstructions on how to upgrade your cluster and fully apply this asynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:73db676a95355a236c35d5644651b25cc61374b51079fc008bc4a926e331d5b5_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:8dc16b0e360c75292e7d61aea44f18e92a548892dbc72ef06b27ce0bc3594268_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:90fdb430e9d4043d73aa78c202762af6b1ab7d3b0f4c282f950db87edea50f17_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:50fae1bb75171943ad9b2af611e351ad9956b5482b0c6842a471e7d4668d88c6_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:92b51965bc246b512f0c1c79cb1136944a0eccf35b55765cbc1265fef26249d5_s390x", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:fbe5128aa8d35cb551f77f87651d8d50c8829921fa61753fd2108afeabd6f0b3_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:347d59a3bd120f1bde3b8a2dcb654b0bc202cb8613bd2420dbdb9206401318ba_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:bf42a58a00016ca3d24aaa5a974d5c435d7b889c3feddef6742fd13c4cc43156_amd64", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:d74ab2ab74f610d21549987635562b265487e299fd8a6cde5f6137337f4eb119_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:11711112cda7e48c5265a4af56ea4e89e06ef9170380713eb2628256b8e86554_ppc64le", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:15c2946d38c93ea386b322b0dc0156e86ba7c515bb945ebbc0a41998e884adec_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:a515389525f187ca6b807386f676b8c881dda2914bb7a3ca42d3110ae9c36308_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:9e821845c2bce35b2f9861d4e152b7b275d6116ac7328304266560e5e0e44f1c_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:a770112e5db1ca608251a863088a6b8dfcd275f62b38761807138864536ff827_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:b83e303973b491ee4094bb3443dcff34fc02691674592f49dec9b2a595946b8c_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2bd413e6a88e30e10d260c3ac4160cb2e5e10b87da3847e420aca5b88cca94bd_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:8a6f66becb7fcff09ed0d06b10b521311103548488c2cf6e1d345f61f9379ba6_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:fdf1998cb87ee949089687b7fa7242bd3ec63d63be170a60c66920fcade58f21_s390x", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:2114a45e1e27718f012b6d269cef03214d0fab6202fa02a89e6e30a7b4b4413e_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:071132b4ea955666bee08b95aeb1175b8e95c6ddabf83d6cfa861e4f20ecc5b9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:20c8405728ff2c03c0c574724abf786a441d3c8fe971b3c4badbc61f7f134364_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:9fca1e906bd7d054903eb4555388e88ff1a48a4718fb9ad9623ab207ad57e328_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:e95f06b8102850f994077f7d1696742dedf987457efb1023255bfc76ddfe7e82_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:6cc8abf04902c77570d6eb3234c20d2b047d285151db883126ff6af06954e781_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:839dbf4732f782bf82096310e30a4831644d777463479481b634165943e14854_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:94a9947f0ad961ff63a78367b732558183d06c39d1c6b265627a5f2e7730536f_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:5312c9b8a95a3a3095d711af08e465697dfcc9582ec1eaad380cea79a77c6353_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:8140c1909722c7b0a7952fa3a35cc828efac177932dca367a80bced752bc3884_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:999ab5e779d6aabc3307d67acb88e89954604443c63be373e33fb50259e06faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:17849a48602902b7f7c1c496bb4717e24fe3bbcb1290b959e61a41c39eeb31e3_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:31f918bd76b2540b04ebef2c438496cfe342e7343e97de9ece3297b3b6ef662b_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:5a0035238163f12bd549bb897a98efe8a16a3e6d41d917524f5ce3a6cf220faa_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:78f900a927ff960efc71bd4a1b2a547190398032b27d78ce684574ed1562f1e9_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:9b799e8cb3b0a4fb6798cd3783eda87c653f13646a40d019771bc3daae339dc5_s390x", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:fb4da57ba59e7e756e1d2e6ff29376fa19e3b5d7240be8b7f41b372311e968b3_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:345da09b727ac2964d49d9c477720ffa3db41531dc4cee1523e22af51e8475a1_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:9e8de3b264829b55e741c39bac1caf411d5ba9b0af403e0b826dfdef936c715a_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:e2ee63520072a4211012453cf0185acf37525a7137d6604001105460fbe3e6ba_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:0c164e63f0b8c111a9f4cd30f8b64b206ca6a82793789bc25a76d4f6b0f83564_amd64", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:120b2ade7eeb5ea0ae3c5f405476d91f95ceab2bc31dbf9cf1a01ad224a0095c_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:99b1bd8421a6026f20a342f49ab701f13f8d113fa22eee71c77ccb792e2e92e5_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:2b8445305330efd142c3750548842784eea007e834b67652207c216c13903dc9_ppc64le", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:74970ac1964f8034b55e56cdd7feeb53318b555db9f4fa3aa5fec7e3ae1e91f8_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:81ee362c800aba49b98554fadb2ba2a27dc76874d42e7a59b110a2d52b49cbfd_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:5bd6d7619ed7cec7285310a35b6d0446b33d954d40c00d8d371b7794b17d2abd_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9a3926862fc565fe051fc394a252ebfec9bf95f7a3e9dcad1e23f8eb59449795_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:9f66ec619d1987375814743d8dcf2bddd614bd48aa66b27dca1783ec23583fdd_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:49638f13441f0a069ede2be7746c6406cfd49e26e8c7586a1301fd570803a056_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:c27787f5dc6f48542b559fa24d8c155d9e0c05d8c6706479e82d25e5527e620f_amd64", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:f9af5ce0724ea9569116869639fc01997e29e0433fa2eaf6db35b5520d06051d_ppc64le", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:062eb37c5307f7f2c040a4b05c3c67c03f92482a7ef6437f76b724cd8abcd988_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:461250be787fd9f8080b8b893e4b3757ed7a8ecfc8b8cd25ecc3298fff881a43_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:fb6129744505be93c87157470f6cb064b144ca3f677cd1c1295aac4b877cfa83_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:080c35c92d4eb359860a280e0445e5b73c984261a47389289e4d4d224a2f40b6_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:38895607c57eb3f007698007beb5b98b9343868e9ae8d82e3630ca148e13f41b_s390x", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5745adcb6f7811cd9c8590c0bdaaeb7fbc87a1c90488265a8c7a59dc0183a4d1_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:255078e72fa9dba0cb3526bfc3c24539ace6ba923440027654f789cb1bad853a_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:819efafabe7a5ba288af26ebeffa3a9c7a7a45f2748aa19df95de4902e13ac2d_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:857a11d3ba757df0b7c7a059f08224abfb8bfe00257a7be9bb3dcdbe062d23f5_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:9f3041ac88b278d6578de091ae07f55484cb2146c24e0854cf167b40370b86ed_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:c16ce00dc71bb24d3f87b9f469c71679c59c6c0c5edcc46b8b9eaa84cc884af7_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ea37fe1185641b6c9ae768093f03e34bd366fd6b40591d0f681422a04e1409ad_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:238e659b5e5311aa6b70df56530e8a1196aab624c4f866e1ba740ed6993773ce_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:9ed7531b1b3b7efc3be78469a0b2c1a7cd5fe3b02cc7909aea847f526ab552b5_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:f30e18881ed1f911dd9d54a31e8d8730c7404ec83174b1c3980c0993b513d4ff_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:2b938e710f58b3d478d24f02a108eaf6d60d89592fe0598dbdad5d612d8efc7e_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:35ee3c5ac2f4ffb521b4b313b22c4dcdb7829f379cb046b937e4fb597cd308d7_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:927d82d10d42f7ee6088e6f6a8594677a8c3b800311a3616d294a6e626e426f5_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:cbf407b2092163315290e5a2175b77cb738bd05b5994cc6e6efec49570aa5823_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e2cfef5e417eeaf22479aa9519637c7a8e6baa371c378b85f2ec8ec74db7ad9c_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:e915affd57530a6e548dc33aeae165f44454e7f46f2af203f7f9ef046633d107_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:2afc5f33714a6766016ca57b3cf28e30d0cd2d3f6490a58a64f06f6811057a9b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:752f0aafeaf686547d78cbaa85724301138af669a7217cabc903c3969c48acad_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:fe6efb535417ae8fc95e9fc297571db880f9be6f7d545e267bc5b86d68456cdd_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:a1a811cf0dddf24c0c747c873f8380272908a54abe4bcd92280b94e7e35c9adc_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:ade6353cf908b0dbc1c2a7a2551e85d465128f2efaa264fa6d75208ee022c30b_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:f21971d369eb6d05d6d1bbca943ca4620d8138c389b59a6b11c3a97d77ecfbdc_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:ab7e5fb916f8b3fb44931e19d10a3f51b80cec6238110cc5104e1053bf941627_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:c001381788a311de9a6367948fb8f15f494e8655cd1adf88da5f221e4d9616a6_s390x", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f29ad60f092f9a09d7ee38b296b2dd9e27432bb9ea9332f54d44e82c3e7189b9_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:34c1d629c84b87efdf2506332d60f45659b84eaca4d79c3e879f8010765c97fc_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:825ebe9a994cd0f1b0ae1c17390911ea0e75c4fde88341b363600f8bda0bf891_amd64", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:e238f48eb350d614392a1f4e614d5abde1130c807f7fa799b25fa001b0e8ea1f_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:2e04d30f7f3914c989f9c09ae59bbc7ec876617d7567344fd2de1b333b5bca72_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:7e8e721648a22125c28b97540e69ccb563e984ebacd1863bdea3153d75e1fcaa_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:bfc79d5467bb5085d571bdf7a806e57e325e7bb71e78d394716fe6cb0564bdb0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:027d0fb2b88b3ed96fa26a2f06389345eb94d5847b050127a7efd0b21d6757b1_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:3626cc233688c708096900c4ceb6beb31f6ddfff602a13b4f87eba069155b5ba_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:81aa6a7837741557c9a244389bd9754e3d293c99bcbb4dabd612d4b07642fc2e_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:4c52429419f7622d684d062ca18e71612c3fef655d1310bab61a52ffcf4fba88_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:774686016d9266becd21958e0cfcbf44f6ba62b243be3f64b1c2cc8e75c51cc6_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:d5d8b2a7bbae34737fad492c33c4d58f30e20840b45a7cfa93a012871f34233b_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:0404feca93373f3e28e7665029a08e4128a288a6e4d7c0f448863b8644cc10a3_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:69c71422e4c40740b3a6521bab2a1394cc82630b5402fc8ca974ac0ed5a00524_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:be75a16de438dc9178fc1e457644d9c68604cd9acf95ff95bbd4e893cc05539d_s390x", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:5f056d933faa553569b0e760db678cc1ef5dd094390d85166e24b1083f0a362b_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:8488ce0be4534a2235980b1afe5bd28f61e6a20666ff1b0aa155da0c4c3acc0b_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:e4d573a0a66db1ac2f1c4c9ea499b12c3e64ce46b1f09e008461bf595f6e8cac_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e198a0306da563148c75eedbb10420524a5063723fcd371cdb812cfeddef2f6_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:984fa7e5ccdd29b63e0e559a1bd846667ea78926734cdede7cf501b84964b73e_amd64", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:e7a1228d43c50b490668bbc98cef9bd8d92ef338e3ef42a89141d01f0e021a84_s390x", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:152101ff80b36daa85263414ff84df64e7110c1bcaeb3aaa7f7e518b9d2b7e65_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:20baf643462e4f809a8ed6256bb833d038a719d03cdc926255594dd0ae8f1781_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:46c486b737b5cfd557f32b67a3c187020324040dfa1fbdacc37f4bba734fd91e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:9642b71784f2cf37d7e2210483d26fb8cfddd5e7d5412d854dcdab1c86cc7136_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:c7c5ac3d4397c5db596977a5c025303a4778464346dd966bc4cf67e5f815f469_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:e7553cbb00351bdf59f67650ca97645ec1c4a12906fd1549d32b492802ce2428_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ba0ed8d2f762acbcd47a9178809cf4b6f439b9774a20c155e102010d32bee900_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:c8e4f446d61019ead2897b4b00c1f511ef358ea4a99b856a064e3a2040b5c1bf_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:ece5cb9ada4ccbfe6cb4bfff54043c85f686b018db66c00136596d60a82a9cd3_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:12e65935ee27cf4530f08aeafb7260821acb267bfcb0f96b364737b7db89d8f3_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:56e6b5b00b3c079d17f53f20d900730fac7070c780add49f49c06f3332437f30_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:df1b7d4b9bae17f086b821fbf1ea8ef00e49d3f2d77ad65338c7584003f89e40_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:0bc12c667de5b3329dff9ee9d22f73ef03820bcfadc7a275bc982f46b5c19605_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:39d2e4aeb27d6b18367abd79b472d9387451505a7a389adf556dfab85a75a627_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:a971ebf2a2e228b036b29c7bbb66c6e2fc9abcf53399067d903ebe1cde1187fc_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:ad6dbcdc69121e50d2b26a505eac144153c6c80265ccb62f93ae8c57d061790f_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c3b7a62001003c35aba096f1873857cf6a1f62b6591091170b2531b7024ee0e9_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:d82d993cb74684d46a91323d1ecdc96ab2acb85e56f53e7e2f8f679c016a0971_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:7fa5a7ac547100f0c3a25a64e08ecbd530685fcc2b93463553e1861000b5b742_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:8679b5ecf27f1e8d33fe36cd6a1d0c09e11bf9787e29ebf5010037eb39c1904f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:fd81754f315288a366350f9dcd9a79b8dbf89863561a93711bbf358daa3488ee_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:498f80a7665b0dbb7c6bf5eb927b61a9d6fa57f82a853bff8ab30a16e6e998b3_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5cea1751e7147addd460024a6209259686a6444c85d5b07bfba719192325f9d5_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:9a3565801a1388326ca46f9869d5721bfccbc8fc3fa67fc01c36eb66a5f09ba5_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:5cc83ea4969406b4a61eab41bcfefdc3c7cc3e43e4f54db490c8e95ad362b212_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:626235e30ae9b1802b3dde031f4ebf5ea83182bf1c653ed4f6b2c60be81aa1b0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:fc4002b36fbb73f63e5447b7d6c17989965b5d42a21eedefa8fc705d62fdf187_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:64e0a038220b74b408a7309b88238362b21104a665eeaadd21a072ed197209d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:f8e4acdcc21f67ac6bcb2991e5bf6d7db8453f43aa5aefc9b6e2022f509b1c45_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:fa22b3a9c978c4b9308b1e8c1991debda170a7b612144df88ad5c09edf98bedf_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:2714bedfd9f8a9bf49e12d16b6030434f908d93bb3b2c04052d50844ddee6310_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:529467ec71ed867a8581460f87119c5abab7f4e9bcbe45906dde32800b8e7397_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:e63349f2e5bdaff833eef67245e9a3c83bc4a52e51779a959aee3012ef963cf4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:245a34cf5bdf526054f1babd0f06bd50c2cae342d98435b019334fccb75fe683_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:542c6e6859a018614f4a1ca8b2775be3a94b5f4d37ed2a65dab9bab3213625ce_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c973c3d7d81f9365641a6c5e6127ac789d8a0e9c3d7f964ce9b5b5a23b22ce3b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:6f662bae4c0a417812107e074b940261b9b7cba74f57af5b9e133abc2eaac8a0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:7645d157d1da41305e74c091cf437f86cd88edf4b8f0f853bd4654a5ad727d9f_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:f3f59980457c208ea6abfd2804ea68dd3293fc2e7bcd21706336e353278400e1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:0fc9d546e67ff5d5cb69460bea160a8ee6832e9944865ed62ffe1e10918d26f5_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:1375e8704e0d7d278bfa49ea228cd95773a967d550f7a691ed2ef39df0df72a1_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:f5411f14e66bfce872ba22f9f3ec9d6b323beab6cc6ae7b61077aa106a4653c1_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:2e0e3e29cf53221146b3ee324b4f68468fcbc3761dec7e515faef1c8ffa0ae54_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:5fb24166b28d113748e45fbed4653825a0ac05bd2ef54306af6301b97ebbb82b_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:bb9d35d399d2c1943d12dacaec47eff52428cd0f40fc1432619c88c52963b58b_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b20bc484d504b17631c73b0f9f13bc20b1dc199f67a8bcfc32c56c965e77f6a4_amd64", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:ef2eb4ddd61d77623a46a6975f062e5c121e9967d557727cf0a74e07f97417f7_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:fcc61ce9c8920f04ceb249fd5f6fdb79ce621f66f0e1d33c1617c94a44b37cbe_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:603e12e7e187f3eb0e24d41437cdcddfb2e9f8019ca28786360211aa2b12a5a2_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:680a758216a72d448295d708cdf71b4fb810fc4af38685d86341f0e3ea42fafb_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:dac641eef9ed950f1bb56e42eac2454ceef7fe223b169df3357fd5e48f4f0a77_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:38d9e0c6501c71518645d96b14dc8c85c546b8b1dc9b62fe735c48c74baf1442_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:6792b90d8d07ccf6b6029d67c8a30407108129511c1944110c92acb73409f074_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:d5a8391d45ed4ec307715d3a259bf5f0ce5ee156cbfa0e1ecbee02f4858231ca_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:4b57afa93ee90573122937ddcab5d2d65a6dcd2c9bb52d8774418aebef99e9c0_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f14e02c8cf44251fbc8da0fe5e32c3ce45dcfd362f4e0147359414e2405e543d_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:f1bc953e1d4857092dd92fa8cc58c82f1a6614418c1cfc521f20cfba0b6e223d_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:412acc6e8ecfc33b3823f6e326b970aa9b99f16faab568f26496e07097d4a4cb_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7cd530b3d9bc161b2bad01332da871cc33ed57979fd2d5d12ba80fa43ff1c758_ppc64le", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:a6e9f165f3c5ffc27f79a60dcb1f05b814a64df0ee759b7cf822d4b34745d50d_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:1e82ae5cddf126f40da57d68c7f06ade4678de2e5c850947ad96e7edbe709086_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:a47b958fc60a30ced17a8dbec654ce09c74b7d9e3b4454c92604acfa55f30c5a_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:ff0eeef2a5ee5497669a2e3d0925fc03e15f7e3f9d589578cc109d1e6993c125_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:2fdde7b60a4b8b7da662ae59508407a116eb9282006be25d68af66513f89b332_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:336e70a504c229c39e454d7ba9394141de8e5cd02d9c3ace20fa810c0adcff2a_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:dc9e1a0821bf1a75b5e5b5203f4b48d992e3111bf47bb8034dfa9a8d02e80369_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:2f6b2e7f6e370e7527620f89f66ca961368af7927c2266b28f6101bbfbe0ddb9_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:c87d09ec4f48909d519e2a9c0ff7d6067db9ebe6e293b2d8508c74c5d41d598e_amd64", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:d5da735410f2adcd5a83d82a0555b1f5b8373d2ccd559793a1f06834d1c5fb5b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:3831f4b9c5d1e14c585e926159be6441cf8c3aee3456ef80e4633324ff42d705_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:bdf6daaa76312f2b7f67ed03cce5ad5b752edc087cb54af0723afeea983230fe_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:d5019d5ac6a331069004bbc698c5548c08fe59b9cd06fb81c1a26785214803d1_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:1d6195cd91f0bc018b26769ef3adb271bf70c90fa3755a27e00f547d80e6b86e_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:23ae1f529a283c4af09c2befa09c7405334a77ba1bfa0be1cf846b67db07d244_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:504a47d4a0ebe4cac8713910e962b94d816f83740dbc33a6e377e8301ff02f87_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0402b7253ca8d9c024cf1a23a3846b5a6f16bb55c0bad475494b611f4b7a7ef0_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:4134dcb0dcef65b2089dbf2443dbbaf8833fa88add99a631b65713276f69f14d_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:66071e326f6b372883d09e199b8d8a4f26eb9decde43bc54072c537b8bdb909b_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2616c0cdfae050d9193eef2e584027151809c70083c20a8819bdae802021a1a8_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:2bb7daa76fac5534bbacdf979d4db9ca6490e400bc47156923e24e5f43afcae3_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:747a8b4839ce9d30f4919d6b96a39fed714a822d48b1a1ea0a92403fd5648138_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:54c4429fe2138b404796709c87993a495e794e209bd03aa23f2cada574f38130_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:bce89429201da4013ea598b492327fcace6cefff21514f2c70db6627a99fd235_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:f47c51f53e7fdd6a90b499750a72e77ef4e3bc6a64ef40ce41df27f3c48b9459_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:48ab11c1081bd28ffa44243f79a0881faaa4df414fb0718f443c8ddd9be40484_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:6c12f72e42c7c92d6511bef8d52b7e4330baef8dff531a2b393b7faf742bc4ca_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:8134608e8fcdebe6ccfa1e8e6187b4951d40ace59a5ea855db7993d5c769bf06_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:41252f947a7057c5420806b94d79719003eb468fabc944ac8a5caf9e24a5dd2d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:778369d66382e15246fc03314819801fa948657d3ffb6365ed4767ef9e2c0b5c_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:cedaf4c8ad93fd200cd3ddb2d7e75bb50765f7489264c636316054bae0d6f008_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:0ff6be652e07cab5d2cdb3df231f8d211f595433dda8057bc94669827a9de40d_ppc64le", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:6a4cf19b68afff8518753123c9dcc3320e6306d2793dbbd97898929eee7d9ce8_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:94f901f33da1e3ed3a374dcbf4c85f0a5573bb7373ee344604186ee95d6faa6a_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:24799fb86a06bf14323300e8b77cca1a2453443fb6cbad5dc111be7ef57541a7_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:5a97bdf8cff4fbf93cb037dfbded20426c5b7e13577d71b69627da46ff592698_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:aec0b4ac00b39df1e9f0313c4b538490c21d973da5383baf8ce6e1fd03f16a1e_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2b2374a55009e8e5215007d375bac10db5842e11989cd778c1d4af6f558f8cb5_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:2ba30c76676ba8167ffcc90c92ffa5f4d5e38ed683ed1f1c09fb7e33bfef43be_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:b4ecafef01a93dd29d6c2630bffd97bbe8a28ad42a70e1e7d38d8cb72db92dea_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:1b61b5ca7083386467afc99e0f5cda4c722ac41185ef8761933bd9604687dd70_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:b3779a14c16b25fe78a47816ed86e072f83fb27bb106edebfa14cbc3ed0ed645_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:f4c056aa319a48de4b93c4121868235a8c5763d20882fb2c78ddf88f2811831e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:163957d6df480189c390194299a48e712277d6ebdd161ca91a989513699d4e5e_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:1d74be1ac44014225211fadf6dcc41fccd8f2a86af9ac790c248109803a83e20_amd64", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:2cab179f1088784519defbc6dbe0a7acd0718451b49c5d2d040b3f1dad1d6b11_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:44ac355dd6d761e8b4e981f45e326652201b8d88677588ad726a05ed96056eac_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:b3b7e25f861a6ac14b9a5ec8f013b8e3a1d47d0e75128480329a9cb624eb8a43_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:cff58096e72f0d5b4b0b2c930622404077aa360507bdc28e10d865d18f3f5342_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:0499ffdca5cb140d8a6db6213d0c9bfc5145291c1798761edd8e90f4c8447d51_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:1378fd45dac0a981b2516dbd574ec12aa95f811d666f122b2b6c21eb664cbb9b_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:6aa240861393870bfc3651931ca3adcb11e74d975617179c90da39a2f8640d9b_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:0930eafead37d89dde0f17f0bcf515820e84bbe60344277214c236f2c9ee6643_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:297571ed486ace2800288a920195e7926d54907e2419152c595c983227313598_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:ba840e1ffa75b5b582ccf399c50848dad37970059b60b2ec9d44c99e4cc615f7_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:5365cd1da61543d8433167fae285e44e87106db35eb80d1e889317b1ccb87eb1_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:7f3bf2c65516cf5cd58d93fd2a0d8bfe579db6edb68d3fdf03efebc64f13a118_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:dfae0ad0740e239e956c90aae17442b7a87ef052806df059032640b858bb5bdc_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:287797ae667817425c5f8a035b82a3781124ac97e36f8d93c9237c89a2052a2f_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3c3d56d7ccd95afbcac40fe985a74b6948db02fd741def395b421501dedd3494_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:d309bcbf8c00ff963c3d9408bd6c34e1e9fc1a53d60696a5c98490a05968da24_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" } ] }
rhsa-2022_1091
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1091", "url": "https://access.redhat.com/errata/RHSA-2022:1091" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1091.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-12-17T23:01:03+00:00", "generator": { "date": "2024-12-17T23:01:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1091", "initial_release_date": "2022-03-29T07:31:21+00:00", "revision_history": [ { "date": "2022-03-29T07:31:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-29T07:31:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:01:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-19.el8_2.src", "product": { "name": "openssl-1:1.1.1c-19.el8_2.src", "product_id": "openssl-1:1.1.1c-19.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-19.el8_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-19.el8_2.aarch64", "product": { "name": "openssl-1:1.1.1c-19.el8_2.aarch64", "product_id": "openssl-1:1.1.1c-19.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-19.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-19.el8_2.aarch64", "product": { "name": "openssl-devel-1:1.1.1c-19.el8_2.aarch64", "product_id": "openssl-devel-1:1.1.1c-19.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-19.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-19.el8_2.aarch64", "product": { "name": "openssl-libs-1:1.1.1c-19.el8_2.aarch64", "product_id": "openssl-libs-1:1.1.1c-19.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-19.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-19.el8_2.aarch64", "product": { "name": "openssl-perl-1:1.1.1c-19.el8_2.aarch64", "product_id": "openssl-perl-1:1.1.1c-19.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-19.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "product": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "product_id": "openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-19.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "product": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "product_id": "openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-19.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "product_id": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-19.el8_2?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-19.el8_2.ppc64le", "product": { "name": "openssl-1:1.1.1c-19.el8_2.ppc64le", "product_id": "openssl-1:1.1.1c-19.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-19.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "product": { "name": "openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "product_id": "openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-19.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "product": { "name": "openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "product_id": "openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-19.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "product": { "name": "openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "product_id": "openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-19.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "product": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "product_id": "openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-19.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "product": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "product_id": "openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-19.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "product_id": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-19.el8_2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-19.el8_2.x86_64", "product": { "name": "openssl-1:1.1.1c-19.el8_2.x86_64", "product_id": "openssl-1:1.1.1c-19.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-19.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-19.el8_2.x86_64", "product": { "name": "openssl-devel-1:1.1.1c-19.el8_2.x86_64", "product_id": "openssl-devel-1:1.1.1c-19.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-19.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-19.el8_2.x86_64", "product": { "name": "openssl-libs-1:1.1.1c-19.el8_2.x86_64", "product_id": "openssl-libs-1:1.1.1c-19.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-19.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-19.el8_2.x86_64", "product": { "name": "openssl-perl-1:1.1.1c-19.el8_2.x86_64", "product_id": "openssl-perl-1:1.1.1c-19.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-19.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "product": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "product_id": "openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-19.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "product": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "product_id": "openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-19.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "product_id": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-19.el8_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.1.1c-19.el8_2.i686", "product": { "name": "openssl-devel-1:1.1.1c-19.el8_2.i686", "product_id": "openssl-devel-1:1.1.1c-19.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-19.el8_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-19.el8_2.i686", "product": { "name": "openssl-libs-1:1.1.1c-19.el8_2.i686", "product_id": "openssl-libs-1:1.1.1c-19.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-19.el8_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-19.el8_2.i686", "product": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.i686", "product_id": "openssl-debugsource-1:1.1.1c-19.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-19.el8_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "product": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "product_id": "openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-19.el8_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "product_id": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-19.el8_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1c-19.el8_2.s390x", "product": { "name": "openssl-1:1.1.1c-19.el8_2.s390x", "product_id": "openssl-1:1.1.1c-19.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-19.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-19.el8_2.s390x", "product": { "name": "openssl-devel-1:1.1.1c-19.el8_2.s390x", "product_id": "openssl-devel-1:1.1.1c-19.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-19.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-19.el8_2.s390x", "product": { "name": "openssl-libs-1:1.1.1c-19.el8_2.s390x", "product_id": "openssl-libs-1:1.1.1c-19.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-19.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-19.el8_2.s390x", "product": { "name": "openssl-perl-1:1.1.1c-19.el8_2.s390x", "product_id": "openssl-perl-1:1.1.1c-19.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-19.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "product": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "product_id": "openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-19.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "product": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "product_id": "openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-19.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "product_id": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-19.el8_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-19.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.aarch64" }, "product_reference": "openssl-1:1.1.1c-19.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-19.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.ppc64le" }, "product_reference": "openssl-1:1.1.1c-19.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-19.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.s390x" }, "product_reference": "openssl-1:1.1.1c-19.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-19.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.src" }, "product_reference": "openssl-1:1.1.1c-19.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-19.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.x86_64" }, "product_reference": "openssl-1:1.1.1c-19.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64" }, "product_reference": "openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.i686" }, "product_reference": "openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.s390x" }, "product_reference": "openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64" }, "product_reference": "openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.aarch64" }, "product_reference": "openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.i686" }, "product_reference": "openssl-debugsource-1:1.1.1c-19.el8_2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le" }, "product_reference": "openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.s390x" }, "product_reference": "openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-19.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.x86_64" }, "product_reference": "openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-19.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.aarch64" }, "product_reference": "openssl-devel-1:1.1.1c-19.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-19.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.i686" }, "product_reference": "openssl-devel-1:1.1.1c-19.el8_2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-19.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.ppc64le" }, "product_reference": "openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-19.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.s390x" }, "product_reference": "openssl-devel-1:1.1.1c-19.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-19.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.x86_64" }, "product_reference": "openssl-devel-1:1.1.1c-19.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-19.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.aarch64" }, "product_reference": "openssl-libs-1:1.1.1c-19.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-19.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.i686" }, "product_reference": "openssl-libs-1:1.1.1c-19.el8_2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-19.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.ppc64le" }, "product_reference": "openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-19.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.s390x" }, "product_reference": "openssl-libs-1:1.1.1c-19.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-19.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.x86_64" }, "product_reference": "openssl-libs-1:1.1.1c-19.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-19.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.aarch64" }, "product_reference": "openssl-perl-1:1.1.1c-19.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-19.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.ppc64le" }, "product_reference": "openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-19.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.s390x" }, "product_reference": "openssl-perl-1:1.1.1c-19.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-19.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.x86_64" }, "product_reference": "openssl-perl-1:1.1.1c-19.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.src", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T07:31:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.src", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1091" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.src", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.src", "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.i686", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-19.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.aarch64", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.s390x", "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-19.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" } ] }
rhsa-2022_1390
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1390", "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1390.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2024-12-17T23:00:40+00:00", "generator": { "date": "2024-12-17T23:00:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1390", "initial_release_date": "2022-04-20T19:30:18+00:00", "revision_history": [ { "date": "2022-04-20T19:30:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:30:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:00:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
wid-sec-w-2022-0515
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:32.847+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-28327" } ] }
wid-sec-w-2022-0169
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "MySQL ist ein Open Source Datenbankserver von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- NetApp Appliance\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0169 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0169.json" }, { "category": "self", "summary": "WID-SEC-2022-0169 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0169" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5490-1 vom 2022-06-21", "url": "https://ubuntu.com/security/notices/USN-5490-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2003-1 vom 2022-06-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" }, { "category": "external", "summary": "Oracle Critical Patch Update April 2022 - Appendix Oracle MySQL vom 2022-04-19", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220429-0005 vom 2022-04-29", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5400-1 vom 2022-05-03", "url": "https://ubuntu.com/security/notices/USN-5400-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5400-2 vom 2022-05-04", "url": "https://ubuntu.com/security/notices/USN-5400-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5400-3 vom 2022-05-05", "url": "https://ubuntu.com/security/notices/USN-5400-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-098 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-098.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6306 vom 2022-09-01", "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6518 vom 2022-09-14", "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6590 vom 2022-09-21", "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6590 vom 2022-09-22", "url": "https://linux.oracle.com/errata/ELSA-2022-6590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1040-3 vom 2022-10-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012505.html" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" }, { "category": "external", "summary": "Oracle Linux Bulletin-October 2022 vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/linuxbulletinoct2022.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7119 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7119 vom 2022-10-27", "url": "https://linux.oracle.com/errata/ELSA-2022-7119.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-165 vom 2022-11-04", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-165.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7464 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7464" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7970 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7970" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7970 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-7970.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8860 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8860" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8847 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8847" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8893 vom 2022-12-15", "url": "https://access.redhat.com/errata/RHSA-2022:8893" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1931 vom 2023-02-06", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1931.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1676 vom 2023-02-06", "url": "https://alas.aws.amazon.com/ALAS-2023-1676.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-1948 vom 2023-02-22", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1948.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3433 vom 2024-05-28", "url": "https://access.redhat.com/errata/RHSA-2024:3433" } ], "source_lang": "en-US", "title": "Oracle MySQL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:08:02.957+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0169", "initial_release_date": "2022-04-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-05-01T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-05-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-05-04T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-05-05T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-06-07T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-21T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-10-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-18T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-11-06T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-07T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-15T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-06T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-02-22T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "26" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c22.2R1", "product": { "name": "Juniper Junos Space \u003c22.2R1", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "product_name", "name": "Junos Space" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c=8.0.29", "product": { "name": "Oracle MySQL \u003c=8.0.29", "product_id": "T022871", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.29" } } }, { "category": "product_version_range", "name": "\u003c=8.0.28", "product": { "name": "Oracle MySQL \u003c=8.0.28", "product_id": "T022872", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.28" } } }, { "category": "product_version_range", "name": "\u003c=5.7.37", "product": { "name": "Oracle MySQL \u003c=5.7.37", "product_id": "T022873", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:5.7.37" } } }, { "category": "product_version_range", "name": "\u003c=7.4.35", "product": { "name": "Oracle MySQL \u003c=7.4.35", "product_id": "T022874", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:7.4.35" } } }, { "category": "product_version_range", "name": "\u003c=7.5.25", "product": { "name": "Oracle MySQL \u003c=7.5.25", "product_id": "T022875", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:7.5.25" } } }, { "category": "product_version_range", "name": "\u003c=7.6.21", "product": { "name": "Oracle MySQL \u003c=7.6.21", "product_id": "T022876", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:7.6.21" } } } ], "category": "product_name", "name": "MySQL" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "367115", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22570", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-22570" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-42340", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-42340" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-44832" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21412", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21412" }, { "cve": "CVE-2022-21413", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21413" }, { "cve": "CVE-2022-21414", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21414" }, { "cve": "CVE-2022-21415", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21415" }, { "cve": "CVE-2022-21417", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21417" }, { "cve": "CVE-2022-21418", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21418" }, { "cve": "CVE-2022-21423", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21423" }, { "cve": "CVE-2022-21425", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21425" }, { "cve": "CVE-2022-21427", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21427" }, { "cve": "CVE-2022-21435", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21435" }, { "cve": "CVE-2022-21436", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21436" }, { "cve": "CVE-2022-21437", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21437" }, { "cve": "CVE-2022-21438", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21438" }, { "cve": "CVE-2022-21440", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21440" }, { "cve": "CVE-2022-21444", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21444" }, { "cve": "CVE-2022-21451", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21451" }, { "cve": "CVE-2022-21452", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21452" }, { "cve": "CVE-2022-21454", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21454" }, { "cve": "CVE-2022-21457", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21457" }, { "cve": "CVE-2022-21459", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21459" }, { "cve": "CVE-2022-21460", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21460" }, { "cve": "CVE-2022-21462", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21462" }, { "cve": "CVE-2022-21478", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21478" }, { "cve": "CVE-2022-21479", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21479" }, { "cve": "CVE-2022-21482", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21482" }, { "cve": "CVE-2022-21483", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21483" }, { "cve": "CVE-2022-21484", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21484" }, { "cve": "CVE-2022-21485", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21485" }, { "cve": "CVE-2022-21486", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21486" }, { "cve": "CVE-2022-21489", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21489" }, { "cve": "CVE-2022-21490", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21490" }, { "cve": "CVE-2022-22965", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-22965" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-23305" } ] }
wid-sec-w-2022-0551
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Kyocera ist ein Hersteller u.a. von Druckern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Kyocera Druckern ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scritping Angriff durchzuf\u00fchren und einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0551 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0551.json" }, { "category": "self", "summary": "WID-SEC-2022-0551 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0551" }, { "category": "external", "summary": "Kyocera Sicherheitshinweise", "url": "https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html" }, { "category": "external", "summary": "Kyocera Security Advisory vom 2022-07-03", "url": "https://kyocommunity.kyocera.de/lexicon/index.php" }, { "category": "external", "summary": "Kyocera - Informationen \u00fcber aktuelle Sicherheitsl\u00fccken vom 2022-07-05", "url": "https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html" }, { "category": "external", "summary": "Kyocera Informationen \u00fcber aktuelle Sicherheitshinweise", "url": "https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html" } ], "source_lang": "en-US", "title": "Kyocera Drucker: Mehrere Schwachstellen", "tracking": { "current_release_date": "2022-11-30T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:51:55.763+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0551", "initial_release_date": "2022-07-03T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "2", "summary": "Informationsseite von Kyocera verlinkt" }, { "date": "2022-08-30T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates aufgenommen" }, { "date": "2022-11-30T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Kyocera Printer", "product": { "name": "Kyocera Printer", "product_id": "T015471", "product_identification_helper": { "cpe": "cpe:/h:kyocera:printer:-" } } } ], "category": "vendor", "name": "Kyocera" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-39238", "notes": [ { "category": "description", "text": "In Kyocera Druckern existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Cross-Site-Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T015471" ] }, "release_date": "2022-07-03T22:00:00Z", "title": "CVE-2021-39238" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Kyocera Druckern existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Cross-Site-Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T015471" ] }, "release_date": "2022-07-03T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-25344", "notes": [ { "category": "description", "text": "In Kyocera Druckern existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Cross-Site-Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T015471" ] }, "release_date": "2022-07-03T22:00:00Z", "title": "CVE-2022-25344" } ] }
WID-SEC-W-2023-1969
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Fabric OS (FOS) ist ein Betriebssystem f\u00fcr FibreChannel Switches.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1969 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1969.json" }, { "category": "self", "summary": "WID-SEC-2023-1969 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1969" }, { "category": "external", "summary": "HPE Security Bulletin HPESBST04494 vom 2023-08-04", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" } ], "source_lang": "en-US", "title": "HPE Fabric OS: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2023-08-06T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:39:20.279+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1969", "initial_release_date": "2023-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1", "product": { "name": "HPE Fabric OS \u003c 9.1.1", "product_id": "T024587", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3c", "product": { "name": "HPE Fabric OS \u003c v8.2.3c", "product_id": "T024589", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3c" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 7.4.2j", "product": { "name": "HPE Fabric OS \u003c 7.4.2j", "product_id": "T029096", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:7.4.2j" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3d", "product": { "name": "HPE Fabric OS \u003c v8.2.3d", "product_id": "T029097", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3d" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.0.1e", "product": { "name": "HPE Fabric OS \u003c 9.0.1e", "product_id": "T029098", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.0.1e" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1c", "product": { "name": "HPE Fabric OS \u003c 9.1.1c", "product_id": "T029101", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1c" } } } ], "category": "product_name", "name": "Fabric OS" }, { "branches": [ { "category": "product_name", "name": "HPE Switch SAN", "product": { "name": "HPE Switch SAN", "product_id": "T029100", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:san_switch" } } }, { "category": "product_name", "name": "HPE Switch Fibre Channel", "product": { "name": "HPE Switch Fibre Channel", "product_id": "T029104", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:fibre_channel" } } } ], "category": "product_name", "name": "Switch" } ], "category": "vendor", "name": "HPE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-31928", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31928" }, { "cve": "CVE-2023-31927", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31927" }, { "cve": "CVE-2023-31926", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31926" }, { "cve": "CVE-2023-31432", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31432" }, { "cve": "CVE-2023-31431", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31431" }, { "cve": "CVE-2023-31430", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31430" }, { "cve": "CVE-2023-31429", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31429" }, { "cve": "CVE-2023-31428", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31428" }, { "cve": "CVE-2023-31427", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31427" }, { "cve": "CVE-2023-31426", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31426" }, { "cve": "CVE-2023-31425", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31425" }, { "cve": "CVE-2022-44792", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3786" }, { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-24448", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-24448" }, { "cve": "CVE-2022-23219", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-23219" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0322", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0322" }, { "cve": "CVE-2022-0155", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0155" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-41617", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-41617" }, { "cve": "CVE-2021-4145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-4145" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-3800", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-3800" }, { "cve": "CVE-2021-20193", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-20193" }, { "cve": "CVE-2021-0146", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-0146" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-14145" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2019-0220" }, { "cve": "CVE-2018-7738", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-7738" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2018-14404", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14348", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14348" }, { "cve": "CVE-2018-0739", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-0739" }, { "cve": "CVE-2014-2524", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2014-2524" }, { "cve": "CVE-2012-0060", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2012-0060" }, { "cve": "CVE-2011-4917", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2011-4917" } ] }
WID-SEC-W-2022-0302
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0302 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json" }, { "category": "self", "summary": "WID-SEC-2022-0302 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-015", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-013 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-012 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:48:03.842+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0302", "initial_release_date": "2022-06-14T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4160" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26486" } ] }
wid-sec-w-2022-0302
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0302 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json" }, { "category": "self", "summary": "WID-SEC-2022-0302 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-015", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-013 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-012 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:48:03.842+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0302", "initial_release_date": "2022-06-14T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4160" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26486" } ] }
wid-sec-w-2022-0065
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- Hardware Appliance\n- Linux\n- NetApp Appliance\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0065 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0065.json" }, { "category": "self", "summary": "WID-SEC-2022-0065 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0065" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-012", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf" }, { "category": "external", "summary": "Aruba Product Security Advisory ARUBA-PSA-2022-009 vom 2022-06-03", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-009.txt" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4690 vom 2022-05-19", "url": "https://access.redhat.com/errata/RHSA-2022:4690" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4896 vom 2022-06-03", "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4899 vom 2022-06-04", "url": "https://access.redhat.com/errata/RHSA-2022:4899" }, { "category": "external", "summary": "OpenSSL Security Advisory vom 2022-03-15", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "category": "external", "summary": "PoC vom 2022-03-15", "url": "https://github.com/drago-96/CVE-2022-0778" }, { "category": "external", "summary": "Amazon Linux Security Advisory vom 2022-03-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1766.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010451.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010448.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010453.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010452.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010455.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" }, { "category": "external", "summary": "Debian Security Advisory vom 2022-03-15", "url": "https://lists.debian.org/debian-security-announce/2022/msg00071.html" }, { "category": "external", "summary": "FreeBSD Security Advisory vom 2022-03-15", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-22:03.openssl.asc" }, { "category": "external", "summary": "Ubuntu Security Advisory vom 2022-03-15", "url": "https://ubuntu.com/security/notices/USN-5328-1" }, { "category": "external", "summary": "Ubuntu Security Advisory vom 2022-03-15", "url": "https://ubuntu.com/security/notices/USN-5328-2" }, { "category": "external", "summary": "LibreSSL Security Advisory vom 2022-03-15", "url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.3.6-relnotes.txt" }, { "category": "external", "summary": "LibreSSL Security Advisory vom 2022-03-15", "url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.3-relnotes.txt" }, { "category": "external", "summary": "LibreSSL Security Advisory vom 2022-03-15", "url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.5.1-relnotes.txt" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1575 vom 2022-03-16", "url": "https://alas.aws.amazon.com/ALAS-2022-1575.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-041 vom 2022-03-17", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-041.html" }, { "category": "external", "summary": "Node.js OpenSSL Security Release", "url": "https://nodejs.org/en/blog/vulnerability/mar-2022-security-releases/" }, { "category": "external", "summary": "Debian Security Advisory DLA-2952 vom 2022-03-17", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2953 vom 2022-03-17", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "category": "external", "summary": "Synology Security Advisory SYNOLOGY-SA-22:04 vom 2022-03-18", "url": "https://www.synology.com/en-global/support/security/Synology_SA_22_04" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9224 vom 2022-03-18", "url": "https://linux.oracle.com/errata/ELSA-2022-9224.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9237 vom 2022-03-19", "url": "https://linux.oracle.com/errata/ELSA-2022-9237.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9225 vom 2022-03-18", "url": "https://linux.oracle.com/errata/ELSA-2022-9225.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220321-0002 vom 2022-03-21", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "category": "external", "summary": "IGEL Security Notice ISN-2022-06 vom 2022-03-21", "url": "https://kb.igel.com/securitysafety/en/isn-2022-06-openssl-denial-of-service-57327268.html" }, { "category": "external", "summary": "SonicWall Security Advisory SNWLID-2022-0002 vom 2022-03-22", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0935-1 vom 2022-03-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010502.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9233 vom 2022-03-23", "url": "https://linux.oracle.com/errata/ELSA-2022-9233.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4956 vom 2022-06-09", "url": "https://access.redhat.com/errata/RHSA-2022:4956" }, { "category": "external", "summary": "CheckMK Werk 13725 vom 2022-03-15", "url": "https://checkmk.com/de/werk/13725" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9246 vom 2022-03-24", "url": "http://linux.oracle.com/errata/ELSA-2022-9246.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1066 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1066" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1078 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1078" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1077 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1077" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1076 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1076" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1073 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1073" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1071 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1071" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1065 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1065" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1082 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1082" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1091 vom 2022-03-29", "url": "https://access.redhat.com/errata/RHSA-2022:1091" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1065 vom 2022-03-28", "url": "https://linux.oracle.com/errata/ELSA-2022-1065.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1066 vom 2022-03-29", "url": "https://linux.oracle.com/errata/ELSA-2022-1066.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:1066 vom 2022-03-29", "url": "https://lists.centos.org/pipermail/centos-announce/2022-March/073577.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1112 vom 2022-03-29", "url": "https://access.redhat.com/errata/RHSA-2022:1112" }, { "category": "external", "summary": "QNAP Security Advisory QSA-22-06 vom 2022-03-30", "url": "https://www.qnap.com/go/security-advisory/qsa-22-06" }, { "category": "external", "summary": "Nessus Security Advisory", "url": "https://de.tenable.com/security/tns-2022-06" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory PAN-190175 vom 2022-03-31", "url": "https://security.paloaltonetworks.com/CVE-2022-0778" }, { "category": "external", "summary": "Nessus Security Advisory", "url": "https://de.tenable.com/security/tns-2022-07?tns_redirect=true" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-22-059 vom 2022-04-01", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-059" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-22-059 vom 2022-04-02", "url": "https://www.fortiguard.com/psirt/FG-IR-22-059" }, { "category": "external", "summary": "Meinberg Security Advisory MBGSA-2022.01 vom 2022-04-05", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2022-01-meinberg-lantime-firmware-v7-04-015-und-v6-24-030.htm" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-102p6-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-103p3-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genuscreen-box-crypt-card-wall-80p3-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genuscreen-box-crypt-card-wall-76p6-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-90p24-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-100p7-verfuegbar.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1263 vom 2022-04-07", "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9272 vom 2022-04-08", "url": "https://linux.oracle.com/errata/ELSA-2022-9272.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0861-1 vom 2022-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010706.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1389 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1390 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1357 vom 2022-04-22", "url": "https://access.redhat.com/errata/RHSA-2022:1357" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1363 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1363" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1370 vom 2022-04-22", "url": "https://access.redhat.com/errata/RHSA-2022:1370" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1476 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1476" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1356 vom 2022-04-22", "url": "https://access.redhat.com/errata/RHSA-2022:1356" }, { "category": "external", "summary": "Watchguard Fireware v12.8 Update 1", "url": "https://www.watchguard.com/wgrd-blog/fireware-v128-update-1" }, { "category": "external", "summary": "Siemens Security Advisory", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "category": "external", "summary": "OPNsense Release Notes", "url": "https://opnsense.org/opnsense-22-1-4-released/" }, { "category": "external", "summary": "Arista Security Advisory 0075", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/15438-security-advisory-0075" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2022-018 vom 2022-04-28", "url": "https://alas.aws.amazon.com/AL2/ALASNITRO-ENCLAVES-2022-018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1459-1 vom 2022-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010863.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1462-1 vom 2022-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1461-1 vom 2022-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1622 vom 2022-05-04", "url": "https://access.redhat.com/errata/RHSA-2022:1622" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1536-1 vom 2022-05-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10", "url": "http://www.auscert.org.au/bulletins/ESB-2022.2191" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10 vom 2022-05-09", "url": "https://www.tenable.com/security/tns-2022-10" }, { "category": "external", "summary": "IGEL Security Notice ISN-2022-12 vom 2022-05-10", "url": "https://kb.igel.com/securitysafety/en/isn-2022-12-teradici-pcoip-library-vulnerabilities-57343640.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2218 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2218" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2217 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2217" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2216 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2216" }, { "category": "external", "summary": "IBM Security Bulletin 6586112 vom 2022-05-13", "url": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory35.asc" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5326 vom 2022-07-01", "url": "https://access.redhat.com/errata/RHSA-2022:5326" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5326 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-5326.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-4899 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-4899.html" }, { "category": "external", "summary": "Unify Security Advisory Report OBSO-2207-01 vom 2022-07-14", "url": "https://networks.unify.com/security/advisories/OBSO-2207-01.pdf" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-121 vom 2022-07-22", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-121/index.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-126 vom 2022-07-28", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-126/index.html" }, { "category": "external", "summary": "Autodesk Security Advisory ADSK-SA-2022-0016 vom 2022-08-02", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0016" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-099 vom 2022-08-22", "url": "https://downloads.avaya.com/css/P8/documents/101083272" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04366 rev.1 vom 2022-09-15", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbhf04366en_us\u0026hprpt_id=ALERT_HPE_3034479\u0026jumpid=em_pom8nu6hj_aid-520066529" }, { "category": "external", "summary": "IBM Security Bulletin 6622079 vom 2022-09-22", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-openssl-affect-ibm-spectrum-protect-plus-sql-file-indexing-and-windows-host-agents/" }, { "category": "external", "summary": "SolarWinds Platform 2022.3 Release Notes", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-3_release_notes.htm" }, { "category": "external", "summary": "Brocade Security Advisory ID", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1752" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" }, { "category": "external", "summary": "Pulse Secure Security Advisory SA45520 vom 2022-10-13", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA45520" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-02 vom 2022-10-16", "url": "https://security.gentoo.org/glsa/202210-02" }, { "category": "external", "summary": "IBM Security Bulletin 6829329 vom 2022-10-15", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-kubernetes-affect-ibm-infosphere-information-server-3/" }, { "category": "external", "summary": "IBM Security Bulletin 6832966 vom 2022-11-01", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-openssl-affects-ibm-flashsystem-models-fs900-and-v9000/" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/6849249" }, { "category": "external", "summary": "Juniper Security Bulletin JSA70180 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US" }, { "category": "external", "summary": "Juniper Security Bulletin JSA70186 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US" }, { "category": "external", "summary": "Dell Knowledge Base Article", "url": "https://www.dell.com/support/kbdoc/en-us/000221474/dsa-2024-059-security-update-for-dell-networker-multiple-components-vulnerabilities" }, { "category": "external", "summary": "Hitachi Cybersecurity Advisory vom 2023-04-25", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02" }, { "category": "external", "summary": "F5 Security Advisory K31323265 vom 2023-06-02", "url": "https://my.f5.com/manage/s/article/K31323265" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-126 vom 2023-07-18", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-126/index.html" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "ORACLE OVMSA-2023-0012 vom 2023-08-17", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2023-August/001077.html" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" }, { "category": "external", "summary": "Hitachi Energy Cybersecurity Advisory vom 2023-08-29", "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153-CSAF\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "external", "summary": "ExtremeNetworks Vulnerability Notice SA-2022-006 vom 2024-01-22", "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000104007" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6457-1 vom 2023-10-30", "url": "https://ubuntu.com/security/notices/USN-6457-1" }, { "category": "external", "summary": "IBM Security Bulletin 7063708 vom 2023-10-31", "url": "https://www.ibm.com/support/pages/node/7063708" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13026 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13026.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13025 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13025.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32790 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32790.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13024 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13024.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13027 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13027.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32791 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32791.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2502 vom 2024-03-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2502.html" }, { "category": "external", "summary": "SolarWinds Platform 2024.2 release notes vom 2024-06-04", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05", "url": "https://linux.oracle.com/errata/ELSA-2024-12408.html" } ], "source_lang": "en-US", "title": "OpenSSL: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-06-04T22:00:00.000+00:00", "generator": { "date": "2024-06-05T08:08:58.409+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0065", "initial_release_date": "2022-03-15T23:00:00.000+00:00", "revision_history": [ { "date": "2022-03-15T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-03-16T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-03-17T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-03-20T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-03-21T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von NetApp und IGEL aufgenommen" }, { "date": "2022-03-22T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Tribe29 aufgenommen" }, { "date": "2022-03-24T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-03-27T22:00:00.000+00:00", "number": "8", "summary": "Referenz(en) aufgenommen: FEDORA-2022-8BB51F6901" }, { "date": "2022-03-28T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-29T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von CentOS und Red Hat aufgenommen" }, { "date": "2022-03-30T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von QNAP, Tenable und Palo Alto Networks aufgenommen" }, { "date": "2022-03-31T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Tenable und Oracle Linux aufgenommen" }, { "date": "2022-04-03T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Fortinet aufgenommen" }, { "date": "2022-04-04T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2022-04-05T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates aufgenommen" }, { "date": "2022-04-06T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-10T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-04-13T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-04-20T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-21T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-25T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "23", "summary": "doppelte Eintr\u00e4ge entfernt" }, { "date": "2022-04-28T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2022-05-04T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-09T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von IGEL aufgenommen" }, { "date": "2022-05-11T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-15T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-05-18T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-02T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Aruba aufgenommen" }, { "date": "2022-06-06T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-08T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-13T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Siemens aufgenommen" }, { "date": "2022-06-14T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2022-06-30T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-14T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Unify aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-08-01T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Autodesk aufgenommen" }, { "date": "2022-08-23T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-09-18T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-09-21T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-09-28T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-13T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Pulse Secure aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Gentoo und IBM aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates aufgenommen" }, { "date": "2023-06-04T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-08-17T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2023-08-28T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates aufgenommen" }, { "date": "2023-10-30T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-12-07T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von ExtremeNetworks aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-03-18T23:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-03T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates aufgenommen" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "66" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T021926", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } }, { "category": "product_name", "name": "Aruba ClearPass Policy Manager", "product": { "name": "Aruba ClearPass Policy Manager", "product_id": "T023403", "product_identification_helper": { "cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:-" } } }, { "category": "product_name", "name": "Aruba Switch", "product": { "name": "Aruba Switch", "product_id": "T016786", "product_identification_helper": { "cpe": "cpe:/h:arubanetworks:switch:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Autodesk AutoCAD", "product": { "name": "Autodesk AutoCAD", "product_id": "950", "product_identification_helper": { "cpe": "cpe:/a:autodesk:autocad:-" } } } ], "category": "vendor", "name": "Autodesk" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.10", "product": { "name": "Dell NetWorker \u003c19.10", "product_id": "T032354", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.6r2", "product": { "name": "Extreme Networks IQ Engine \u003c10.6r2", "product_id": "T032273", "product_identification_helper": { "cpe": "cpe:/o:extremenetworks:iq_engine:10.6r2" } } } ], "category": "product_name", "name": "IQ Engine" } ], "category": "vendor", "name": "Extreme Networks" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fortinet FortiAnalyzer", "product": { "name": "Fortinet FortiAnalyzer", "product_id": "T022516", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortianalyzer:-" } } }, { "category": "product_name", "name": "Fortinet FortiAuthenticator", "product": { "name": "Fortinet FortiAuthenticator", "product_id": "1002224", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortiauthenticator:-" } } }, { "category": "product_name", "name": "Fortinet FortiClient", "product": { "name": "Fortinet FortiClient", "product_id": "T022517", "product_identification_helper": { "cpe": "cpe:/a:fortinet:forticlient:-" } } }, { "category": "product_name", "name": "Fortinet FortiMail", "product": { "name": "Fortinet FortiMail", "product_id": "T022518", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortimail:-" } } }, { "category": "product_name", "name": "Fortinet FortiManager", "product": { "name": "Fortinet FortiManager", "product_id": "T003827", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortimanager:-" } } }, { "category": "product_name", "name": "Fortinet FortiOS", "product": { "name": "Fortinet FortiOS", "product_id": "T009615", "product_identification_helper": { "cpe": "cpe:/o:fortinet:fortios:-" } } }, { "category": "product_name", "name": "Fortinet FortiSwitch", "product": { "name": "Fortinet FortiSwitch", "product_id": "T022519", "product_identification_helper": { "cpe": "cpe:/h:fortinet:fortiswitch:-" } } } ], "category": "vendor", "name": "Fortinet" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "HPE Fabric OS \u003c9.1.1", "product_id": "T024587", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.1e", "product": { "name": "HPE Fabric OS \u003c9.0.1e", "product_id": "T024588", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.19.0.1e" } } } ], "category": "product_name", "name": "Fabric OS" }, { "branches": [ { "category": "product_version", "name": "5", "product": { "name": "HPE Integrated Lights-Out 5", "product_id": "T012640", "product_identification_helper": { "cpe": "cpe:/h:hp:integrated_lights-out:5" } } }, { "category": "product_version", "name": "4", "product": { "name": "HPE Integrated Lights-Out 4", "product_id": "T014339", "product_identification_helper": { "cpe": "cpe:/h:hp:integrated_lights-out:4" } } } ], "category": "product_name", "name": "Integrated Lights-Out" }, { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } }, { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy RTU500", "product": { "name": "Hitachi Energy RTU500", "product_id": "T027844", "product_identification_helper": { "cpe": "cpe:/h:abb:rtu500:-" } } } ], "category": "vendor", "name": "Hitachi Energy" }, { "branches": [ { "category": "product_name", "name": "IBM AIX", "product": { "name": "IBM AIX", "product_id": "5094", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:-" } } }, { "category": "product_name", "name": "IBM FlashSystem", "product": { "name": "IBM FlashSystem", "product_id": "T025159", "product_identification_helper": { "cpe": "cpe:/a:ibm:flashsystem:-" } } }, { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.24", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.24", "product_id": "T030689", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.24" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "10.0.1.0", "product": { "name": "IBM Security Identity Manager 10.0.1.0", "product_id": "T025664", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_identity_manager:10.0.1.0" } } } ], "category": "product_name", "name": "Security Identity Manager" }, { "branches": [ { "category": "product_version", "name": "10.0.0.0-10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0-10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" }, { "category": "product_name", "name": "IBM Spectrum Protect", "product": { "name": "IBM Spectrum Protect", "product_id": "T013661", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "IGEL OS", "product": { "name": "IGEL OS", "product_id": "T017865", "product_identification_helper": { "cpe": "cpe:/o:igel:os:-" } } } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "5930", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } }, { "category": "product_version", "name": "Evolved", "product": { "name": "Juniper JUNOS Evolved", "product_id": "T018886", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:evolved" } } } ], "category": "product_name", "name": "JUNOS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c22.2R1", "product": { "name": "Juniper Junos Space \u003c22.2R1", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "product_name", "name": "Junos Space" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV7.04.015", "product": { "name": "Meinberg LANTIME \u003cV7.04.015", "product_id": "T022524", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:v7.04.015" } } }, { "category": "product_version_range", "name": "\u003cV6.24.030", "product": { "name": "Meinberg LANTIME \u003cV6.24.030", "product_id": "T022525", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:v6.24.030" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "NetApp AFF", "product": { "name": "NetApp AFF", "product_id": "T020536", "product_identification_helper": { "cpe": "cpe:/h:netapp:aff:-" } } }, { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } }, { "category": "product_name", "name": "NetApp FAS", "product": { "name": "NetApp FAS", "product_id": "T011540", "product_identification_helper": { "cpe": "cpe:/h:netapp:fas:-" } } }, { "category": "product_name", "name": "NetApp StorageGRID", "product": { "name": "NetApp StorageGRID", "product_id": "920206", "product_identification_helper": { "cpe": "cpe:/a:netapp:storagegrid:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.3.6", "product": { "name": "Open Source LibreSSL \u003c3.3.6", "product_id": "T022349", "product_identification_helper": { "cpe": "cpe:/a:openbsd:libressl:3.3.6" } } }, { "category": "product_version_range", "name": "\u003c3.4.3", "product": { "name": "Open Source LibreSSL \u003c3.4.3", "product_id": "T022350", "product_identification_helper": { "cpe": "cpe:/a:openbsd:libressl:3.4.3" } } }, { "category": "product_version_range", "name": "\u003c3.5.1", "product": { "name": "Open Source LibreSSL \u003c3.5.1", "product_id": "T022351", "product_identification_helper": { "cpe": "cpe:/a:openbsd:libressl:3.5.1" } } } ], "category": "product_name", "name": "LibreSSL" }, { "category": "product_name", "name": "Open Source Node.js", "product": { "name": "Open Source Node.js", "product_id": "T017684", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c22.1.4", "product": { "name": "Open Source OPNsense \u003c22.1.4", "product_id": "T022958", "product_identification_helper": { "cpe": "cpe:/a:opnsense:opnsense:22.1.4" } } } ], "category": "product_name", "name": "OPNsense" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.0.2zd", "product": { "name": "Open Source OpenSSL \u003c1.0.2zd", "product_id": "T022343", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.0.2zd" } } }, { "category": "product_version_range", "name": "\u003c1.1.1n", "product": { "name": "Open Source OpenSSL \u003c1.1.1n", "product_id": "T022344", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.1n" } } }, { "category": "product_version_range", "name": "\u003c3.0.2", "product": { "name": "Open Source OpenSSL \u003c3.0.2", "product_id": "T022345", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.0.2" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_version", "name": "3", "product": { "name": "Oracle VM 3", "product_id": "T019617", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:3" } } } ], "category": "product_name", "name": "VM" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "PaloAlto Networks PAN-OS", "product": { "name": "PaloAlto Networks PAN-OS", "product_id": "T016533", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:-" } } } ], "category": "vendor", "name": "PaloAlto Networks" }, { "branches": [ { "category": "product_name", "name": "Pulse Secure Pulse Connect Secure", "product": { "name": "Pulse Secure Pulse Connect Secure", "product_id": "333006", "product_identification_helper": { "cpe": "cpe:/a:pulsesecure:pulse_connect_secure:8.0" } } } ], "category": "vendor", "name": "Pulse Secure" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Siemens SIMATIC S7", "product": { "name": "Siemens SIMATIC S7", "product_id": "T020086", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:-" } } }, { "category": "product_name", "name": "Siemens SIMATIC WinCC", "product": { "name": "Siemens SIMATIC WinCC", "product_id": "909207", "product_identification_helper": { "cpe": "cpe:/a:siemens:simatic_wincc:-" } } } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "SolarWinds Orion", "product": { "name": "SolarWinds Orion", "product_id": "T024734", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_core_services:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c2024.2", "product": { "name": "SolarWinds Platform \u003c2024.2", "product_id": "T035149", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_platform:2024.2" } } } ], "category": "product_name", "name": "Platform" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "SonicWall SonicOS", "product": { "name": "SonicWall SonicOS", "product_id": "885060", "product_identification_helper": { "cpe": "cpe:/o:sonicwall:sonicos:-" } } } ], "category": "vendor", "name": "SonicWall" }, { "branches": [ { "category": "product_name", "name": "Synology DiskStation Manager", "product": { "name": "Synology DiskStation Manager", "product_id": "450918", "product_identification_helper": { "cpe": "cpe:/a:synology:diskstation_manager:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus", "product": { "name": "Tenable Security Nessus", "product_id": "999278", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.0.1", "product": { "name": "Tenable Security Nessus Network Monitor \u003c6.0.1", "product_id": "T023141", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.0.1" } } } ], "category": "product_name", "name": "Nessus Network Monitor" } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "883326", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } }, { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "category": "product_name", "name": "Unify OpenScape 4000", "product": { "name": "Unify OpenScape 4000", "product_id": "T018011", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_4000:-" } } }, { "category": "product_name", "name": "Unify OpenScape Accouting", "product": { "name": "Unify OpenScape Accouting", "product_id": "T023857", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_accounting:-" } } }, { "category": "product_name", "name": "Unify OpenScape Branch", "product": { "name": "Unify OpenScape Branch", "product_id": "T018258", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_branch:-" } } }, { "category": "product_name", "name": "Unify OpenScape Business", "product": { "name": "Unify OpenScape Business", "product_id": "T018012", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_business:-" } } }, { "category": "product_name", "name": "Unify OpenScape Concierge", "product": { "name": "Unify OpenScape Concierge", "product_id": "T023859", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_concierge:-" } } }, { "category": "product_name", "name": "Unify OpenScape Contact Center", "product": { "name": "Unify OpenScape Contact Center", "product_id": "T008876", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_contact_center:-" } } }, { "category": "product_name", "name": "Unify OpenScape Cordless IP", "product": { "name": "Unify OpenScape Cordless IP", "product_id": "T018016", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_cordless_ip:-" } } }, { "category": "product_name", "name": "Unify OpenScape Desk Phone", "product": { "name": "Unify OpenScape Desk Phone", "product_id": "T018015", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_deskphone:-" } } }, { "category": "product_name", "name": "Unify OpenScape Mediaserver", "product": { "name": "Unify OpenScape Mediaserver", "product_id": "T018253", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_mediaserver:-" } } }, { "category": "product_name", "name": "Unify OpenScape SBC", "product": { "name": "Unify OpenScape SBC", "product_id": "T008874", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_sbc:-" } } }, { "category": "product_name", "name": "Unify OpenScape Voice", "product": { "name": "Unify OpenScape Voice", "product_id": "T008873", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_voice:-" } } }, { "category": "product_name", "name": "Unify OpenScape WLAN Phone", "product": { "name": "Unify OpenScape WLAN Phone", "product_id": "T023862", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_wlan_phone:-" } } }, { "category": "product_name", "name": "Unify OpenScape Xpert", "product": { "name": "Unify OpenScape Xpert", "product_id": "T018014", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_xpert:-" } } }, { "category": "product_name", "name": "Unify OpenScape Xpressions", "product": { "name": "Unify OpenScape Xpressions", "product_id": "T023863", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_xpressions:-" } } }, { "category": "product_name", "name": "Unify SESAP", "product": { "name": "Unify SESAP", "product_id": "T023861", "product_identification_helper": { "cpe": "cpe:/a:unify:sesap:-" } } } ], "category": "vendor", "name": "Unify" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.8 Update 1", "product": { "name": "WatchGuard Firebox \u003c12.8 Update 1", "product_id": "T010780", "product_identification_helper": { "cpe": "cpe:/a:watchguard:firebox:12.0" } } } ], "category": "product_name", "name": "Firebox" } ], "category": "vendor", "name": "WatchGuard" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.0p24", "product": { "name": "genua genugate \u003c9.0p24", "product_id": "T022549", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:9.0p24" } } }, { "category": "product_version_range", "name": "\u003c10.0p7", "product": { "name": "genua genugate \u003c10.0p7", "product_id": "T022550", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:10.0p7" } } }, { "category": "product_version_range", "name": "\u003c10.3p3", "product": { "name": "genua genugate \u003c10.3p3", "product_id": "T022551", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:10.3p3" } } }, { "category": "product_version_range", "name": "\u003c10.2p6", "product": { "name": "genua genugate \u003c10.2p6", "product_id": "T022552", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:10.2p6" } } } ], "category": "product_name", "name": "genugate" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0p3", "product": { "name": "genua genuscreen \u003c8.0p3", "product_id": "T022547", "product_identification_helper": { "cpe": "cpe:/h:genua:genuscreen:8.0p3" } } }, { "category": "product_version_range", "name": "\u003c7.6p6", "product": { "name": "genua genuscreen \u003c7.6p6", "product_id": "T022548", "product_identification_helper": { "cpe": "cpe:/h:genua:genuscreen:7.6p6" } } } ], "category": "product_name", "name": "genuscreen" } ], "category": "vendor", "name": "genua" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.2.0i1", "product": { "name": "Checkmk Checkmk \u003c2.2.0i1", "product_id": "T022241", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.2.0i1" } } }, { "category": "product_version_range", "name": "\u003c2.1.0b3", "product": { "name": "Checkmk Checkmk \u003c2.1.0b3", "product_id": "T022381", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.1.0b3" } } } ], "category": "product_name", "name": "checkmk" } ], "category": "vendor", "name": "tribe29" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL. Der Fehler besteht aufgrund einer Endlosschleife beim Parsen von Zertifikaten in der Funktion BN_mod_sqrt(). Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T008876", "T008873", "T003343", "T008874", "T031895", "T015844", "T030689", "T015127", "T021926", "T015126", "T016533", "T004914", "T013661", "T003827", "T018886", "950", "883326", "5930", "T019617", "398363", "T020086", "T015519", "T015518", "T035149", "T015516", "7654", "885060", "T005119", "T032273", "T012167", "T012640", "T018011", "T018253", "T032354", "T018012", "T017562", "T017684", "T018014", "T018015", "T018016", "T018258", "T022516", "T022517", "2951", "T002207", "T020536", "444803", "T023403", "T024734", "T025664", "T027844", "920206", "T009310", "T014339", "67646", "4035", "1002224", "T011540", "450918", "T022518", "T022519", "T023857", "T023859", "T020304", "999278", "T001663", "T024588", "T024587", "T025159", "T009615", "T016786", "5094", "333006", "T017100", "909207", "T023863", "T017865", "T000126", "T023861", "T023862", "1727" ] }, "release_date": "2022-03-15T23:00:00Z", "title": "CVE-2022-0778" } ] }
WID-SEC-W-2024-1186
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM DB2 REST ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1186 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1186.json" }, { "category": "self", "summary": "WID-SEC-2024-1186 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1186" }, { "category": "external", "summary": "IBM Security Bulletin - 7154484 vom 2024-05-20", "url": "https://www.ibm.com/support/pages/node/7154484" } ], "source_lang": "en-US", "title": "IBM DB2 REST: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-20T22:00:00.000+00:00", "generator": { "date": "2024-05-21T10:06:00.707+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1186", "initial_release_date": "2024-05-20T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-20T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "REST \u003c1.0.0.304-amd64", "product": { "name": "IBM DB2 REST \u003c1.0.0.304-amd64", "product_id": "T034928", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:rest__1.0.0.304-amd64" } } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19126", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2019-19126" }, { "cve": "CVE-2020-10029", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-10029" }, { "cve": "CVE-2020-1751", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-1752" }, { "cve": "CVE-2021-35942", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-35942" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-3999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-4160" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2023-48795" } ] }
wid-sec-w-2022-0200
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE und OpenJDK ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- NetApp Appliance\n- Sonstiges\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0200 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0200.json" }, { "category": "self", "summary": "WID-SEC-2022-0200 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0200" }, { "category": "external", "summary": "IBM Security Bulletin 7058364 vom 2023-10-24", "url": "https://www.ibm.com/support/pages/node/7058364" }, { "category": "external", "summary": "IBM Security Bulletin 7056031 vom 2023-10-19", "url": "https://www.ibm.com/support/pages/node/7056031" }, { "category": "external", "summary": "IBM Security Bulletin 7041681 vom 2023-10-04", "url": "https://www.ibm.com/support/pages/node/7041681" }, { "category": "external", "summary": "IBM Security Bulletin 7006407 vom 2023-06-23", "url": "https://www.ibm.com/support/pages/node/7006407" }, { "category": "external", "summary": "IBM Security Bulletin 6995887 vom 2023-05-19", "url": "https://aix.software.ibm.com/aix/efixes/security/java_may2023_advisory.asc" }, { "category": "external", "summary": "IBM Security Bulletin 6967221 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967221" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-038 vom 2022-06-08", "url": "https://download.avaya.com/css/public/documents/101082271" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1728 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:1728" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2137 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:2137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1729 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:1729" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2272 vom 2022-05-26", "url": "https://access.redhat.com/errata/RHSA-2022:2272" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-113 vom 2022-05-27", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-113/index.html" }, { "category": "external", "summary": "Release Notes f\u00fcr Security Event Manager", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2022-2-1_release_notes.htm" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4957 vom 2022-06-09", "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4959 vom 2022-06-09", "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "category": "external", "summary": "Oracle Critical Patch Update April 2022 - Appendix Oracle Java SE vom 2022-04-19", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA" }, { "category": "external", "summary": "OpenJDK Vulnerability Advisory", "url": "https://openjdk.java.net/groups/vulnerability/advisories/2022-04-19" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1440 vom 2022-04-20", "url": "http://linux.oracle.com/errata/ELSA-2022-1440.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1444 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1444" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1443 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1443" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1442 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1442" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1441 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1441" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1440 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1440" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1445 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1445" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1442 vom 2022-04-20", "url": "http://linux.oracle.com/errata/ELSA-2022-1442.html" }, { "category": "external", "summary": "CVE-2022-21449 PoC vom 2022-04-21", "url": "https://github.com/khalednassar/CVE-2022-21449-TLS-PoC" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1445 vom 2022-04-21", "url": "https://linux.oracle.com/errata/ELSA-2022-1445.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1490 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1490" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1491 vom 2022-04-26", "url": "http://linux.oracle.com/errata/ELSA-2022-1491.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1487 vom 2022-04-26", "url": "http://linux.oracle.com/errata/ELSA-2022-1487.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1491 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1491" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1489 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1489" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1487 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1488 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1488" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5388-1 vom 2022-04-26", "url": "https://ubuntu.com/security/notices/USN-5388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5388-2 vom 2022-04-26", "url": "https://ubuntu.com/security/notices/USN-5388-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1791 vom 2022-04-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1791.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1790 vom 2022-04-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1790.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1778 vom 2022-04-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1778.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-038 vom 2022-04-26", "url": "https://downloads.avaya.com/css/P8/documents/101081600" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1439 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1439" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1492 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1492" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-002 vom 2022-04-28", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1435 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1435" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-039 vom 2022-04-27", "url": "https://downloads.avaya.com/css/P8/documents/101081609" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1436 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1437 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1437" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1438 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1438" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220429-0006 vom 2022-04-29", "url": "https://security.netapp.com/advisory/ntap-20220429-0006/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1474-1 vom 2022-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1520 vom 2022-05-02", "url": "https://access.redhat.com/errata/RHSA-2022:1520" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1519 vom 2022-05-02", "url": "https://access.redhat.com/errata/RHSA-2022:1519" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1513-1 vom 2022-05-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5128 vom 2022-05-03", "url": "https://lists.debian.org/debian-security-announce/2022/msg00096.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1622 vom 2022-05-04", "url": "https://access.redhat.com/errata/RHSA-2022:1622" }, { "category": "external", "summary": "Debian Security Advisory DSA-5131 vom 2022-05-05", "url": "https://lists.debian.org/debian-security-announce/2022/msg00099.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1679 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1679" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2218 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2218" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2217 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2217" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2216 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2216" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1699 vom 2022-05-13", "url": "https://access.redhat.com/errata/RHSA-2022:1699" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:1487 vom 2022-05-13", "url": "https://lists.centos.org/pipermail/centos-announce/2022-May/073583.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3006 vom 2022-05-14", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:1440 vom 2022-05-13", "url": "https://lists.centos.org/pipermail/centos-announce/2022-May/073586.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1728 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-1728.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-2137 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-2137.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1729 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-1729.html" }, { "category": "external", "summary": "EMC Security Advisory DSA-2022-189 vom 2022-07-14", "url": "https://www.dell.com/support/kbdoc/de-de/000201463/dsa-2022-189-dell-emc-networker-runtime-environment-nre-security-update-for-java-se-embedded-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2540-1 vom 2022-07-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2530-1 vom 2022-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2531-1 vom 2022-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2539-1 vom 2022-07-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2650-1 vom 2022-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5837 vom 2022-08-03", "url": "https://access.redhat.com/errata/RHSA-2022:5837" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5546-2 vom 2022-08-04", "url": "https://ubuntu.com/security/notices/USN-5546-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5546-1 vom 2022-08-04", "url": "https://ubuntu.com/security/notices/USN-5546-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1631 vom 2022-08-23", "url": "https://alas.aws.amazon.com/ALAS-2022-1631.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3092-1 vom 2022-09-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1633 vom 2022-09-12", "url": "https://alas.aws.amazon.com/ALAS-2022-1633.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2JAVA-OPENJDK11-2022-002 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASJAVA-OPENJDK11-2022-002.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1835 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1835.html" }, { "category": "external", "summary": "IBM Security Bulletin 6824717 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-semeru-runtime-affect-spss-collaboration-and-deployment-services-cve-2022-21496-cve-2022-21426/" }, { "category": "external", "summary": "IBM Security Bulletin 6824713 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-java-runtime-affects-spss-collaboration-and-deployment-services-cve-2022-21496/" }, { "category": "external", "summary": "IBM Security Bulletin 6824763 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-txseries-for-multiplatforms-is-vulnerable-to-several-no-confidentiality-exposures-due-to-ibm-sdk-java-technology-edition/" }, { "category": "external", "summary": "IBM Security Bulletin 6825125 vom 2022-10-01", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-affected-by-multiple-vulnerabilities-in-ibm-runtime-environment-java-technology-edition-version-8/" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" } ], "source_lang": "en-US", "title": "Oracle Java SE und OpenJDK: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-24T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:47:10.128+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0200", "initial_release_date": "2022-04-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-04-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-04-21T22:00:00.000+00:00", "number": "3", "summary": "PoC f\u00fcr CVE-2022-21449 aufgenommen" }, { "date": "2022-04-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-04-25T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon und AVAYA aufgenommen" }, { "date": "2022-04-28T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat, Amazon und AVAYA aufgenommen" }, { "date": "2022-05-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von NetApp, Red Hat und SUSE aufgenommen" }, { "date": "2022-05-02T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-03T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2022-05-04T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-05T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-11T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-12T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-15T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von CentOS und Debian aufgenommen" }, { "date": "2022-05-19T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-22T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat und HITACHI aufgenommen" }, { "date": "2022-05-31T22:00:00.000+00:00", "number": "21", "summary": "Anpassung" }, { "date": "2022-06-08T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-19T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-13T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von EMC aufgenommen" }, { "date": "2022-07-24T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-23T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-28T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates aufgenommen" }, { "date": "2023-03-30T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-21T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-06-22T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "41" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Corretto", "product": { "name": "Amazon Corretto", "product_id": "T023017", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:-" } } }, { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya CMS", "product": { "name": "Avaya CMS", "product_id": "997", "product_identification_helper": { "cpe": "cpe:/a:avaya:call_management_system_server:-" } } }, { "category": "product_name", "name": "Avaya Session Border Controller", "product": { "name": "Avaya Session Border Controller", "product_id": "T015520", "product_identification_helper": { "cpe": "cpe:/h:avaya:session_border_controller:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "EMC NetWorker", "product": { "name": "EMC NetWorker", "product_id": "3479", "product_identification_helper": { "cpe": "cpe:/a:emc:networker:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM AIX 7.2", "product": { "name": "IBM AIX 7.2", "product_id": "434967", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } }, { "category": "product_name", "name": "IBM AIX 7.3", "product": { "name": "IBM AIX 7.3", "product_id": "T021486", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.3" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_name", "name": "IBM Java \u003c 7.1.5.17", "product": { "name": "IBM Java \u003c 7.1.5.17", "product_id": "T027013", "product_identification_helper": { "cpe": "cpe:/a:ibm:jre:7.1.5.17" } } }, { "category": "product_name", "name": "IBM Java \u003c 8.0.8.0", "product": { "name": "IBM Java \u003c 8.0.8.0", "product_id": "T027014", "product_identification_helper": { "cpe": "cpe:/a:ibm:jre:8.0.8.0" } } } ], "category": "product_name", "name": "Java" }, { "category": "product_name", "name": "IBM MQ", "product": { "name": "IBM MQ", "product_id": "T021398", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:-" } } }, { "category": "product_name", "name": "IBM Rational Build Forge \u003c 8.0.0.23", "product": { "name": "IBM Rational Build Forge \u003c 8.0.0.23", "product_id": "T024052", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.23" } } }, { "category": "product_name", "name": "IBM Rational Business Developer", "product": { "name": "IBM Rational Business Developer", "product_id": "T025611", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_business_developer:-" } } }, { "category": "product_name", "name": "IBM Rational ClearQuest \u003c 9.0.2.8", "product": { "name": "IBM Rational ClearQuest \u003c 9.0.2.8", "product_id": "T030204", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:9.0.2.8" } } }, { "category": "product_name", "name": "IBM SPSS 8.4", "product": { "name": "IBM SPSS 8.4", "product_id": "T024740", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:8.4" } } }, { "branches": [ { "category": "product_name", "name": "IBM TXSeries 9.1", "product": { "name": "IBM TXSeries 9.1", "product_id": "T015903", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_9.1" } } }, { "category": "product_name", "name": "IBM TXSeries 8.2", "product": { "name": "IBM TXSeries 8.2", "product_id": "T015904", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.2" } } } ], "category": "product_name", "name": "TXSeries" }, { "category": "product_name", "name": "IBM Tivoli Netcool/OMNIbus \u003c 8.1.0.31", "product": { "name": "IBM Tivoli Netcool/OMNIbus \u003c 8.1.0.31", "product_id": "T030747", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0.31" } } }, { "category": "product_name", "name": "IBM VIOS 3.1", "product": { "name": "IBM VIOS 3.1", "product_id": "1039165", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:3.1" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space \u003c 22.2R1", "product": { "name": "Juniper Junos Space \u003c 22.2R1", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "580789", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Java SE 21.3.1", "product": { "name": "Oracle Java SE 21.3.1", "product_id": "T022864", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:21.3.1" } } }, { "category": "product_name", "name": "Oracle Java SE 22.0.0.2", "product": { "name": "Oracle Java SE 22.0.0.2", "product_id": "T022865", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:22.0.0.2" } } }, { "category": "product_name", "name": "Oracle Java SE 11.0.14", "product": { "name": "Oracle Java SE 11.0.14", "product_id": "T022866", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:11.0.14" } } }, { "category": "product_name", "name": "Oracle Java SE 17.0.2", "product": { "name": "Oracle Java SE 17.0.2", "product_id": "T022867", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:17.0.2" } } }, { "category": "product_name", "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.5", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.5", "product_id": "T022909", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_20.3.5" } } }, { "category": "product_name", "name": "Oracle Java SE Oracle Java SE: 7u331", "product": { "name": "Oracle Java SE Oracle Java SE: 7u331", "product_id": "T022910", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_java_se_7u331" } } }, { "category": "product_name", "name": "Oracle Java SE 8u321", "product": { "name": "Oracle Java SE 8u321", "product_id": "T022911", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:8u321" } } }, { "category": "product_name", "name": "Oracle Java SE 18; Oracle GraalVM Enterprise Edition: 20.3.5", "product": { "name": "Oracle Java SE 18; Oracle GraalVM Enterprise Edition: 20.3.5", "product_id": "T022912", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:18_oracle_graalvm_enterprise_edition_20.3.5" } } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21496" } ] }
WID-SEC-W-2022-0065
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- Hardware Appliance\n- Linux\n- NetApp Appliance\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0065 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0065.json" }, { "category": "self", "summary": "WID-SEC-2022-0065 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0065" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-012", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf" }, { "category": "external", "summary": "Aruba Product Security Advisory ARUBA-PSA-2022-009 vom 2022-06-03", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-009.txt" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4690 vom 2022-05-19", "url": "https://access.redhat.com/errata/RHSA-2022:4690" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4896 vom 2022-06-03", "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4899 vom 2022-06-04", "url": "https://access.redhat.com/errata/RHSA-2022:4899" }, { "category": "external", "summary": "OpenSSL Security Advisory vom 2022-03-15", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "category": "external", "summary": "PoC vom 2022-03-15", "url": "https://github.com/drago-96/CVE-2022-0778" }, { "category": "external", "summary": "Amazon Linux Security Advisory vom 2022-03-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1766.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010451.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010448.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010453.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010452.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010455.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" }, { "category": "external", "summary": "Debian Security Advisory vom 2022-03-15", "url": "https://lists.debian.org/debian-security-announce/2022/msg00071.html" }, { "category": "external", "summary": "FreeBSD Security Advisory vom 2022-03-15", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-22:03.openssl.asc" }, { "category": "external", "summary": "Ubuntu Security Advisory vom 2022-03-15", "url": "https://ubuntu.com/security/notices/USN-5328-1" }, { "category": "external", "summary": "Ubuntu Security Advisory vom 2022-03-15", "url": "https://ubuntu.com/security/notices/USN-5328-2" }, { "category": "external", "summary": "LibreSSL Security Advisory vom 2022-03-15", "url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.3.6-relnotes.txt" }, { "category": "external", "summary": "LibreSSL Security Advisory vom 2022-03-15", "url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.3-relnotes.txt" }, { "category": "external", "summary": "LibreSSL Security Advisory vom 2022-03-15", "url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.5.1-relnotes.txt" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1575 vom 2022-03-16", "url": "https://alas.aws.amazon.com/ALAS-2022-1575.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-041 vom 2022-03-17", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-041.html" }, { "category": "external", "summary": "Node.js OpenSSL Security Release", "url": "https://nodejs.org/en/blog/vulnerability/mar-2022-security-releases/" }, { "category": "external", "summary": "Debian Security Advisory DLA-2952 vom 2022-03-17", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2953 vom 2022-03-17", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "category": "external", "summary": "Synology Security Advisory SYNOLOGY-SA-22:04 vom 2022-03-18", "url": "https://www.synology.com/en-global/support/security/Synology_SA_22_04" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9224 vom 2022-03-18", "url": "https://linux.oracle.com/errata/ELSA-2022-9224.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9237 vom 2022-03-19", "url": "https://linux.oracle.com/errata/ELSA-2022-9237.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9225 vom 2022-03-18", "url": "https://linux.oracle.com/errata/ELSA-2022-9225.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220321-0002 vom 2022-03-21", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "category": "external", "summary": "IGEL Security Notice ISN-2022-06 vom 2022-03-21", "url": "https://kb.igel.com/securitysafety/en/isn-2022-06-openssl-denial-of-service-57327268.html" }, { "category": "external", "summary": "SonicWall Security Advisory SNWLID-2022-0002 vom 2022-03-22", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0935-1 vom 2022-03-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010502.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9233 vom 2022-03-23", "url": "https://linux.oracle.com/errata/ELSA-2022-9233.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4956 vom 2022-06-09", "url": "https://access.redhat.com/errata/RHSA-2022:4956" }, { "category": "external", "summary": "CheckMK Werk 13725 vom 2022-03-15", "url": "https://checkmk.com/de/werk/13725" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9246 vom 2022-03-24", "url": "http://linux.oracle.com/errata/ELSA-2022-9246.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1066 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1066" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1078 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1078" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1077 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1077" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1076 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1076" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1073 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1073" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1071 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1071" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1065 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1065" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1082 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:1082" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1091 vom 2022-03-29", "url": "https://access.redhat.com/errata/RHSA-2022:1091" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1065 vom 2022-03-28", "url": "https://linux.oracle.com/errata/ELSA-2022-1065.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1066 vom 2022-03-29", "url": "https://linux.oracle.com/errata/ELSA-2022-1066.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:1066 vom 2022-03-29", "url": "https://lists.centos.org/pipermail/centos-announce/2022-March/073577.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1112 vom 2022-03-29", "url": "https://access.redhat.com/errata/RHSA-2022:1112" }, { "category": "external", "summary": "QNAP Security Advisory QSA-22-06 vom 2022-03-30", "url": "https://www.qnap.com/go/security-advisory/qsa-22-06" }, { "category": "external", "summary": "Nessus Security Advisory", "url": "https://de.tenable.com/security/tns-2022-06" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory PAN-190175 vom 2022-03-31", "url": "https://security.paloaltonetworks.com/CVE-2022-0778" }, { "category": "external", "summary": "Nessus Security Advisory", "url": "https://de.tenable.com/security/tns-2022-07?tns_redirect=true" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-22-059 vom 2022-04-01", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-059" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-22-059 vom 2022-04-02", "url": "https://www.fortiguard.com/psirt/FG-IR-22-059" }, { "category": "external", "summary": "Meinberg Security Advisory MBGSA-2022.01 vom 2022-04-05", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2022-01-meinberg-lantime-firmware-v7-04-015-und-v6-24-030.htm" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-102p6-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-103p3-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genuscreen-box-crypt-card-wall-80p3-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genuscreen-box-crypt-card-wall-76p6-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-90p24-verfuegbar.html" }, { "category": "external", "summary": "Genua Patch", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-100p7-verfuegbar.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1263 vom 2022-04-07", "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9272 vom 2022-04-08", "url": "https://linux.oracle.com/errata/ELSA-2022-9272.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0861-1 vom 2022-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010706.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1389 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1390 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1357 vom 2022-04-22", "url": "https://access.redhat.com/errata/RHSA-2022:1357" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1363 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1363" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1370 vom 2022-04-22", "url": "https://access.redhat.com/errata/RHSA-2022:1370" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1476 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1476" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1356 vom 2022-04-22", "url": "https://access.redhat.com/errata/RHSA-2022:1356" }, { "category": "external", "summary": "Watchguard Fireware v12.8 Update 1", "url": "https://www.watchguard.com/wgrd-blog/fireware-v128-update-1" }, { "category": "external", "summary": "Siemens Security Advisory", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "category": "external", "summary": "OPNsense Release Notes", "url": "https://opnsense.org/opnsense-22-1-4-released/" }, { "category": "external", "summary": "Arista Security Advisory 0075", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/15438-security-advisory-0075" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2022-018 vom 2022-04-28", "url": "https://alas.aws.amazon.com/AL2/ALASNITRO-ENCLAVES-2022-018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1459-1 vom 2022-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010863.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1462-1 vom 2022-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1461-1 vom 2022-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1622 vom 2022-05-04", "url": "https://access.redhat.com/errata/RHSA-2022:1622" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1536-1 vom 2022-05-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10", "url": "http://www.auscert.org.au/bulletins/ESB-2022.2191" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10 vom 2022-05-09", "url": "https://www.tenable.com/security/tns-2022-10" }, { "category": "external", "summary": "IGEL Security Notice ISN-2022-12 vom 2022-05-10", "url": "https://kb.igel.com/securitysafety/en/isn-2022-12-teradici-pcoip-library-vulnerabilities-57343640.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2218 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2218" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2217 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2217" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2216 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2216" }, { "category": "external", "summary": "IBM Security Bulletin 6586112 vom 2022-05-13", "url": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory35.asc" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5326 vom 2022-07-01", "url": "https://access.redhat.com/errata/RHSA-2022:5326" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5326 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-5326.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-4899 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-4899.html" }, { "category": "external", "summary": "Unify Security Advisory Report OBSO-2207-01 vom 2022-07-14", "url": "https://networks.unify.com/security/advisories/OBSO-2207-01.pdf" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-121 vom 2022-07-22", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-121/index.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-126 vom 2022-07-28", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-126/index.html" }, { "category": "external", "summary": "Autodesk Security Advisory ADSK-SA-2022-0016 vom 2022-08-02", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0016" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-099 vom 2022-08-22", "url": "https://downloads.avaya.com/css/P8/documents/101083272" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04366 rev.1 vom 2022-09-15", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbhf04366en_us\u0026hprpt_id=ALERT_HPE_3034479\u0026jumpid=em_pom8nu6hj_aid-520066529" }, { "category": "external", "summary": "IBM Security Bulletin 6622079 vom 2022-09-22", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-openssl-affect-ibm-spectrum-protect-plus-sql-file-indexing-and-windows-host-agents/" }, { "category": "external", "summary": "SolarWinds Platform 2022.3 Release Notes", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-3_release_notes.htm" }, { "category": "external", "summary": "Brocade Security Advisory ID", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1752" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" }, { "category": "external", "summary": "Pulse Secure Security Advisory SA45520 vom 2022-10-13", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA45520" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-02 vom 2022-10-16", "url": "https://security.gentoo.org/glsa/202210-02" }, { "category": "external", "summary": "IBM Security Bulletin 6829329 vom 2022-10-15", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-kubernetes-affect-ibm-infosphere-information-server-3/" }, { "category": "external", "summary": "IBM Security Bulletin 6832966 vom 2022-11-01", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-openssl-affects-ibm-flashsystem-models-fs900-and-v9000/" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/6849249" }, { "category": "external", "summary": "Juniper Security Bulletin JSA70180 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US" }, { "category": "external", "summary": "Juniper Security Bulletin JSA70186 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US" }, { "category": "external", "summary": "Dell Knowledge Base Article", "url": "https://www.dell.com/support/kbdoc/en-us/000221474/dsa-2024-059-security-update-for-dell-networker-multiple-components-vulnerabilities" }, { "category": "external", "summary": "Hitachi Cybersecurity Advisory vom 2023-04-25", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02" }, { "category": "external", "summary": "F5 Security Advisory K31323265 vom 2023-06-02", "url": "https://my.f5.com/manage/s/article/K31323265" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-126 vom 2023-07-18", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-126/index.html" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "ORACLE OVMSA-2023-0012 vom 2023-08-17", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2023-August/001077.html" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" }, { "category": "external", "summary": "Hitachi Energy Cybersecurity Advisory vom 2023-08-29", "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153-CSAF\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "external", "summary": "ExtremeNetworks Vulnerability Notice SA-2022-006 vom 2024-01-22", "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000104007" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6457-1 vom 2023-10-30", "url": "https://ubuntu.com/security/notices/USN-6457-1" }, { "category": "external", "summary": "IBM Security Bulletin 7063708 vom 2023-10-31", "url": "https://www.ibm.com/support/pages/node/7063708" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13026 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13026.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13025 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13025.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32790 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32790.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13024 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13024.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13027 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13027.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32791 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32791.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2502 vom 2024-03-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2502.html" }, { "category": "external", "summary": "SolarWinds Platform 2024.2 release notes vom 2024-06-04", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05", "url": "https://linux.oracle.com/errata/ELSA-2024-12408.html" } ], "source_lang": "en-US", "title": "OpenSSL: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-06-04T22:00:00.000+00:00", "generator": { "date": "2024-06-05T08:08:58.409+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0065", "initial_release_date": "2022-03-15T23:00:00.000+00:00", "revision_history": [ { "date": "2022-03-15T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-03-16T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-03-17T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-03-20T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-03-21T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von NetApp und IGEL aufgenommen" }, { "date": "2022-03-22T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Tribe29 aufgenommen" }, { "date": "2022-03-24T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-03-27T22:00:00.000+00:00", "number": "8", "summary": "Referenz(en) aufgenommen: FEDORA-2022-8BB51F6901" }, { "date": "2022-03-28T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-29T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von CentOS und Red Hat aufgenommen" }, { "date": "2022-03-30T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von QNAP, Tenable und Palo Alto Networks aufgenommen" }, { "date": "2022-03-31T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Tenable und Oracle Linux aufgenommen" }, { "date": "2022-04-03T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Fortinet aufgenommen" }, { "date": "2022-04-04T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2022-04-05T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates aufgenommen" }, { "date": "2022-04-06T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-10T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-04-13T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-04-20T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-21T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-25T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "23", "summary": "doppelte Eintr\u00e4ge entfernt" }, { "date": "2022-04-28T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2022-05-04T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-09T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von IGEL aufgenommen" }, { "date": "2022-05-11T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-15T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-05-18T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-02T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Aruba aufgenommen" }, { "date": "2022-06-06T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-08T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-13T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Siemens aufgenommen" }, { "date": "2022-06-14T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2022-06-30T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-14T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Unify aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-08-01T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Autodesk aufgenommen" }, { "date": "2022-08-23T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-09-18T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-09-21T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-09-28T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-13T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Pulse Secure aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Gentoo und IBM aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates aufgenommen" }, { "date": "2023-06-04T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-08-17T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2023-08-28T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates aufgenommen" }, { "date": "2023-10-30T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-12-07T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von ExtremeNetworks aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-03-18T23:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-03T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates aufgenommen" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "66" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T021926", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } }, { "category": "product_name", "name": "Aruba ClearPass Policy Manager", "product": { "name": "Aruba ClearPass Policy Manager", "product_id": "T023403", "product_identification_helper": { "cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:-" } } }, { "category": "product_name", "name": "Aruba Switch", "product": { "name": "Aruba Switch", "product_id": "T016786", "product_identification_helper": { "cpe": "cpe:/h:arubanetworks:switch:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Autodesk AutoCAD", "product": { "name": "Autodesk AutoCAD", "product_id": "950", "product_identification_helper": { "cpe": "cpe:/a:autodesk:autocad:-" } } } ], "category": "vendor", "name": "Autodesk" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.10", "product": { "name": "Dell NetWorker \u003c19.10", "product_id": "T032354", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.6r2", "product": { "name": "Extreme Networks IQ Engine \u003c10.6r2", "product_id": "T032273", "product_identification_helper": { "cpe": "cpe:/o:extremenetworks:iq_engine:10.6r2" } } } ], "category": "product_name", "name": "IQ Engine" } ], "category": "vendor", "name": "Extreme Networks" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fortinet FortiAnalyzer", "product": { "name": "Fortinet FortiAnalyzer", "product_id": "T022516", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortianalyzer:-" } } }, { "category": "product_name", "name": "Fortinet FortiAuthenticator", "product": { "name": "Fortinet FortiAuthenticator", "product_id": "1002224", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortiauthenticator:-" } } }, { "category": "product_name", "name": "Fortinet FortiClient", "product": { "name": "Fortinet FortiClient", "product_id": "T022517", "product_identification_helper": { "cpe": "cpe:/a:fortinet:forticlient:-" } } }, { "category": "product_name", "name": "Fortinet FortiMail", "product": { "name": "Fortinet FortiMail", "product_id": "T022518", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortimail:-" } } }, { "category": "product_name", "name": "Fortinet FortiManager", "product": { "name": "Fortinet FortiManager", "product_id": "T003827", "product_identification_helper": { "cpe": "cpe:/a:fortinet:fortimanager:-" } } }, { "category": "product_name", "name": "Fortinet FortiOS", "product": { "name": "Fortinet FortiOS", "product_id": "T009615", "product_identification_helper": { "cpe": "cpe:/o:fortinet:fortios:-" } } }, { "category": "product_name", "name": "Fortinet FortiSwitch", "product": { "name": "Fortinet FortiSwitch", "product_id": "T022519", "product_identification_helper": { "cpe": "cpe:/h:fortinet:fortiswitch:-" } } } ], "category": "vendor", "name": "Fortinet" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "HPE Fabric OS \u003c9.1.1", "product_id": "T024587", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.1e", "product": { "name": "HPE Fabric OS \u003c9.0.1e", "product_id": "T024588", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.19.0.1e" } } } ], "category": "product_name", "name": "Fabric OS" }, { "branches": [ { "category": "product_version", "name": "5", "product": { "name": "HPE Integrated Lights-Out 5", "product_id": "T012640", "product_identification_helper": { "cpe": "cpe:/h:hp:integrated_lights-out:5" } } }, { "category": "product_version", "name": "4", "product": { "name": "HPE Integrated Lights-Out 4", "product_id": "T014339", "product_identification_helper": { "cpe": "cpe:/h:hp:integrated_lights-out:4" } } } ], "category": "product_name", "name": "Integrated Lights-Out" }, { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } }, { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy RTU500", "product": { "name": "Hitachi Energy RTU500", "product_id": "T027844", "product_identification_helper": { "cpe": "cpe:/h:abb:rtu500:-" } } } ], "category": "vendor", "name": "Hitachi Energy" }, { "branches": [ { "category": "product_name", "name": "IBM AIX", "product": { "name": "IBM AIX", "product_id": "5094", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:-" } } }, { "category": "product_name", "name": "IBM FlashSystem", "product": { "name": "IBM FlashSystem", "product_id": "T025159", "product_identification_helper": { "cpe": "cpe:/a:ibm:flashsystem:-" } } }, { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.24", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.24", "product_id": "T030689", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.24" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "10.0.1.0", "product": { "name": "IBM Security Identity Manager 10.0.1.0", "product_id": "T025664", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_identity_manager:10.0.1.0" } } } ], "category": "product_name", "name": "Security Identity Manager" }, { "branches": [ { "category": "product_version", "name": "10.0.0.0-10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0-10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" }, { "category": "product_name", "name": "IBM Spectrum Protect", "product": { "name": "IBM Spectrum Protect", "product_id": "T013661", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "IGEL OS", "product": { "name": "IGEL OS", "product_id": "T017865", "product_identification_helper": { "cpe": "cpe:/o:igel:os:-" } } } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "5930", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } }, { "category": "product_version", "name": "Evolved", "product": { "name": "Juniper JUNOS Evolved", "product_id": "T018886", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:evolved" } } } ], "category": "product_name", "name": "JUNOS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c22.2R1", "product": { "name": "Juniper Junos Space \u003c22.2R1", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "product_name", "name": "Junos Space" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV7.04.015", "product": { "name": "Meinberg LANTIME \u003cV7.04.015", "product_id": "T022524", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:v7.04.015" } } }, { "category": "product_version_range", "name": "\u003cV6.24.030", "product": { "name": "Meinberg LANTIME \u003cV6.24.030", "product_id": "T022525", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:v6.24.030" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "NetApp AFF", "product": { "name": "NetApp AFF", "product_id": "T020536", "product_identification_helper": { "cpe": "cpe:/h:netapp:aff:-" } } }, { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } }, { "category": "product_name", "name": "NetApp FAS", "product": { "name": "NetApp FAS", "product_id": "T011540", "product_identification_helper": { "cpe": "cpe:/h:netapp:fas:-" } } }, { "category": "product_name", "name": "NetApp StorageGRID", "product": { "name": "NetApp StorageGRID", "product_id": "920206", "product_identification_helper": { "cpe": "cpe:/a:netapp:storagegrid:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.3.6", "product": { "name": "Open Source LibreSSL \u003c3.3.6", "product_id": "T022349", "product_identification_helper": { "cpe": "cpe:/a:openbsd:libressl:3.3.6" } } }, { "category": "product_version_range", "name": "\u003c3.4.3", "product": { "name": "Open Source LibreSSL \u003c3.4.3", "product_id": "T022350", "product_identification_helper": { "cpe": "cpe:/a:openbsd:libressl:3.4.3" } } }, { "category": "product_version_range", "name": "\u003c3.5.1", "product": { "name": "Open Source LibreSSL \u003c3.5.1", "product_id": "T022351", "product_identification_helper": { "cpe": "cpe:/a:openbsd:libressl:3.5.1" } } } ], "category": "product_name", "name": "LibreSSL" }, { "category": "product_name", "name": "Open Source Node.js", "product": { "name": "Open Source Node.js", "product_id": "T017684", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c22.1.4", "product": { "name": "Open Source OPNsense \u003c22.1.4", "product_id": "T022958", "product_identification_helper": { "cpe": "cpe:/a:opnsense:opnsense:22.1.4" } } } ], "category": "product_name", "name": "OPNsense" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.0.2zd", "product": { "name": "Open Source OpenSSL \u003c1.0.2zd", "product_id": "T022343", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.0.2zd" } } }, { "category": "product_version_range", "name": "\u003c1.1.1n", "product": { "name": "Open Source OpenSSL \u003c1.1.1n", "product_id": "T022344", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.1n" } } }, { "category": "product_version_range", "name": "\u003c3.0.2", "product": { "name": "Open Source OpenSSL \u003c3.0.2", "product_id": "T022345", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.0.2" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_version", "name": "3", "product": { "name": "Oracle VM 3", "product_id": "T019617", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:3" } } } ], "category": "product_name", "name": "VM" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "PaloAlto Networks PAN-OS", "product": { "name": "PaloAlto Networks PAN-OS", "product_id": "T016533", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:-" } } } ], "category": "vendor", "name": "PaloAlto Networks" }, { "branches": [ { "category": "product_name", "name": "Pulse Secure Pulse Connect Secure", "product": { "name": "Pulse Secure Pulse Connect Secure", "product_id": "333006", "product_identification_helper": { "cpe": "cpe:/a:pulsesecure:pulse_connect_secure:8.0" } } } ], "category": "vendor", "name": "Pulse Secure" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Siemens SIMATIC S7", "product": { "name": "Siemens SIMATIC S7", "product_id": "T020086", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:-" } } }, { "category": "product_name", "name": "Siemens SIMATIC WinCC", "product": { "name": "Siemens SIMATIC WinCC", "product_id": "909207", "product_identification_helper": { "cpe": "cpe:/a:siemens:simatic_wincc:-" } } } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "SolarWinds Orion", "product": { "name": "SolarWinds Orion", "product_id": "T024734", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_core_services:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c2024.2", "product": { "name": "SolarWinds Platform \u003c2024.2", "product_id": "T035149", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_platform:2024.2" } } } ], "category": "product_name", "name": "Platform" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "SonicWall SonicOS", "product": { "name": "SonicWall SonicOS", "product_id": "885060", "product_identification_helper": { "cpe": "cpe:/o:sonicwall:sonicos:-" } } } ], "category": "vendor", "name": "SonicWall" }, { "branches": [ { "category": "product_name", "name": "Synology DiskStation Manager", "product": { "name": "Synology DiskStation Manager", "product_id": "450918", "product_identification_helper": { "cpe": "cpe:/a:synology:diskstation_manager:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus", "product": { "name": "Tenable Security Nessus", "product_id": "999278", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.0.1", "product": { "name": "Tenable Security Nessus Network Monitor \u003c6.0.1", "product_id": "T023141", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.0.1" } } } ], "category": "product_name", "name": "Nessus Network Monitor" } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "883326", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } }, { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "category": "product_name", "name": "Unify OpenScape 4000", "product": { "name": "Unify OpenScape 4000", "product_id": "T018011", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_4000:-" } } }, { "category": "product_name", "name": "Unify OpenScape Accouting", "product": { "name": "Unify OpenScape Accouting", "product_id": "T023857", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_accounting:-" } } }, { "category": "product_name", "name": "Unify OpenScape Branch", "product": { "name": "Unify OpenScape Branch", "product_id": "T018258", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_branch:-" } } }, { "category": "product_name", "name": "Unify OpenScape Business", "product": { "name": "Unify OpenScape Business", "product_id": "T018012", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_business:-" } } }, { "category": "product_name", "name": "Unify OpenScape Concierge", "product": { "name": "Unify OpenScape Concierge", "product_id": "T023859", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_concierge:-" } } }, { "category": "product_name", "name": "Unify OpenScape Contact Center", "product": { "name": "Unify OpenScape Contact Center", "product_id": "T008876", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_contact_center:-" } } }, { "category": "product_name", "name": "Unify OpenScape Cordless IP", "product": { "name": "Unify OpenScape Cordless IP", "product_id": "T018016", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_cordless_ip:-" } } }, { "category": "product_name", "name": "Unify OpenScape Desk Phone", "product": { "name": "Unify OpenScape Desk Phone", "product_id": "T018015", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_deskphone:-" } } }, { "category": "product_name", "name": "Unify OpenScape Mediaserver", "product": { "name": "Unify OpenScape Mediaserver", "product_id": "T018253", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_mediaserver:-" } } }, { "category": "product_name", "name": "Unify OpenScape SBC", "product": { "name": "Unify OpenScape SBC", "product_id": "T008874", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_sbc:-" } } }, { "category": "product_name", "name": "Unify OpenScape Voice", "product": { "name": "Unify OpenScape Voice", "product_id": "T008873", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_voice:-" } } }, { "category": "product_name", "name": "Unify OpenScape WLAN Phone", "product": { "name": "Unify OpenScape WLAN Phone", "product_id": "T023862", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_wlan_phone:-" } } }, { "category": "product_name", "name": "Unify OpenScape Xpert", "product": { "name": "Unify OpenScape Xpert", "product_id": "T018014", "product_identification_helper": { "cpe": "cpe:/h:unify:openscape_xpert:-" } } }, { "category": "product_name", "name": "Unify OpenScape Xpressions", "product": { "name": "Unify OpenScape Xpressions", "product_id": "T023863", "product_identification_helper": { "cpe": "cpe:/a:unify:openscape_xpressions:-" } } }, { "category": "product_name", "name": "Unify SESAP", "product": { "name": "Unify SESAP", "product_id": "T023861", "product_identification_helper": { "cpe": "cpe:/a:unify:sesap:-" } } } ], "category": "vendor", "name": "Unify" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.8 Update 1", "product": { "name": "WatchGuard Firebox \u003c12.8 Update 1", "product_id": "T010780", "product_identification_helper": { "cpe": "cpe:/a:watchguard:firebox:12.0" } } } ], "category": "product_name", "name": "Firebox" } ], "category": "vendor", "name": "WatchGuard" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.0p24", "product": { "name": "genua genugate \u003c9.0p24", "product_id": "T022549", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:9.0p24" } } }, { "category": "product_version_range", "name": "\u003c10.0p7", "product": { "name": "genua genugate \u003c10.0p7", "product_id": "T022550", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:10.0p7" } } }, { "category": "product_version_range", "name": "\u003c10.3p3", "product": { "name": "genua genugate \u003c10.3p3", "product_id": "T022551", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:10.3p3" } } }, { "category": "product_version_range", "name": "\u003c10.2p6", "product": { "name": "genua genugate \u003c10.2p6", "product_id": "T022552", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:10.2p6" } } } ], "category": "product_name", "name": "genugate" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0p3", "product": { "name": "genua genuscreen \u003c8.0p3", "product_id": "T022547", "product_identification_helper": { "cpe": "cpe:/h:genua:genuscreen:8.0p3" } } }, { "category": "product_version_range", "name": "\u003c7.6p6", "product": { "name": "genua genuscreen \u003c7.6p6", "product_id": "T022548", "product_identification_helper": { "cpe": "cpe:/h:genua:genuscreen:7.6p6" } } } ], "category": "product_name", "name": "genuscreen" } ], "category": "vendor", "name": "genua" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.2.0i1", "product": { "name": "Checkmk Checkmk \u003c2.2.0i1", "product_id": "T022241", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.2.0i1" } } }, { "category": "product_version_range", "name": "\u003c2.1.0b3", "product": { "name": "Checkmk Checkmk \u003c2.1.0b3", "product_id": "T022381", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.1.0b3" } } } ], "category": "product_name", "name": "checkmk" } ], "category": "vendor", "name": "tribe29" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL. Der Fehler besteht aufgrund einer Endlosschleife beim Parsen von Zertifikaten in der Funktion BN_mod_sqrt(). Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T008876", "T008873", "T003343", "T008874", "T031895", "T015844", "T030689", "T015127", "T021926", "T015126", "T016533", "T004914", "T013661", "T003827", "T018886", "950", "883326", "5930", "T019617", "398363", "T020086", "T015519", "T015518", "T035149", "T015516", "7654", "885060", "T005119", "T032273", "T012167", "T012640", "T018011", "T018253", "T032354", "T018012", "T017562", "T017684", "T018014", "T018015", "T018016", "T018258", "T022516", "T022517", "2951", "T002207", "T020536", "444803", "T023403", "T024734", "T025664", "T027844", "920206", "T009310", "T014339", "67646", "4035", "1002224", "T011540", "450918", "T022518", "T022519", "T023857", "T023859", "T020304", "999278", "T001663", "T024588", "T024587", "T025159", "T009615", "T016786", "5094", "333006", "T017100", "909207", "T023863", "T017865", "T000126", "T023861", "T023862", "1727" ] }, "release_date": "2022-03-15T23:00:00Z", "title": "CVE-2022-0778" } ] }
WID-SEC-W-2022-0551
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Kyocera ist ein Hersteller u.a. von Druckern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Kyocera Druckern ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scritping Angriff durchzuf\u00fchren und einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0551 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0551.json" }, { "category": "self", "summary": "WID-SEC-2022-0551 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0551" }, { "category": "external", "summary": "Kyocera Sicherheitshinweise", "url": "https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html" }, { "category": "external", "summary": "Kyocera Security Advisory vom 2022-07-03", "url": "https://kyocommunity.kyocera.de/lexicon/index.php" }, { "category": "external", "summary": "Kyocera - Informationen \u00fcber aktuelle Sicherheitsl\u00fccken vom 2022-07-05", "url": "https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html" }, { "category": "external", "summary": "Kyocera Informationen \u00fcber aktuelle Sicherheitshinweise", "url": "https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecken.html" } ], "source_lang": "en-US", "title": "Kyocera Drucker: Mehrere Schwachstellen", "tracking": { "current_release_date": "2022-11-30T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:51:55.763+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0551", "initial_release_date": "2022-07-03T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "2", "summary": "Informationsseite von Kyocera verlinkt" }, { "date": "2022-08-30T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates aufgenommen" }, { "date": "2022-11-30T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Kyocera Printer", "product": { "name": "Kyocera Printer", "product_id": "T015471", "product_identification_helper": { "cpe": "cpe:/h:kyocera:printer:-" } } } ], "category": "vendor", "name": "Kyocera" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-39238", "notes": [ { "category": "description", "text": "In Kyocera Druckern existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Cross-Site-Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T015471" ] }, "release_date": "2022-07-03T22:00:00Z", "title": "CVE-2021-39238" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Kyocera Druckern existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Cross-Site-Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T015471" ] }, "release_date": "2022-07-03T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-25344", "notes": [ { "category": "description", "text": "In Kyocera Druckern existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Cross-Site-Scripting Angriff durchzuf\u00fchren und einen Denial of Service Zustand zu verursachen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T015471" ] }, "release_date": "2022-07-03T22:00:00Z", "title": "CVE-2022-25344" } ] }
WID-SEC-W-2022-0515
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:32.847+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-28327" } ] }
WID-SEC-W-2022-1335
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1335 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json" }, { "category": "self", "summary": "WID-SEC-2022-1335 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-021 vom 2022-09-07", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:57:44.642+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1335", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2021-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-0561" }, { "cve": "CVE-2021-21708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-21708" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-30809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30897" }, { "cve": "CVE-2021-30934", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30934" }, { "cve": "CVE-2021-30936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30936" }, { "cve": "CVE-2021-30951", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30951" }, { "cve": "CVE-2021-30952", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30952" }, { "cve": "CVE-2021-30953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30953" }, { "cve": "CVE-2021-30954", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30954" }, { "cve": "CVE-2021-30984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30984" }, { "cve": "CVE-2021-3448", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-3448" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-4115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4115" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4217" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-45481", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45481" }, { "cve": "CVE-2021-45482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45482" }, { "cve": "CVE-2021-45483", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45483" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0156", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0156" }, { "cve": "CVE-2022-0158", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0158" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0408" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0417" }, { "cve": "CVE-2022-0443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0443" }, { "cve": "CVE-2022-0554", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0554" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0572" }, { "cve": "CVE-2022-0629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0629" }, { "cve": "CVE-2022-0685", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0685" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0714", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0714" }, { "cve": "CVE-2022-0729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0729" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1097" }, { "cve": "CVE-2022-1196", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1196" }, { "cve": "CVE-2022-1197", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1197" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1520", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1520" }, { "cve": "CVE-2022-1834", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1834" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21514", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21514" }, { "cve": "CVE-2022-21524", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21524" }, { "cve": "CVE-2022-21533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21533" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-22590", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22590" }, { "cve": "CVE-2022-22592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22592" }, { "cve": "CVE-2022-22620", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22620" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24130", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24130" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24713", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24713" }, { "cve": "CVE-2022-24801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24801" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25762" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26486" }, { "cve": "CVE-2022-28281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28281" }, { "cve": "CVE-2022-28282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28282" }, { "cve": "CVE-2022-28285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28285" }, { "cve": "CVE-2022-28286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28286" }, { "cve": "CVE-2022-28289", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28289" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28346", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28346" }, { "cve": "CVE-2022-28347", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28347" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-29909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29909" }, { "cve": "CVE-2022-29911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29911" }, { "cve": "CVE-2022-29912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29912" }, { "cve": "CVE-2022-29913", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29913" }, { "cve": "CVE-2022-29914", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29914" }, { "cve": "CVE-2022-29916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29916" }, { "cve": "CVE-2022-29917", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29917" }, { "cve": "CVE-2022-31736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31736" }, { "cve": "CVE-2022-31737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31737" }, { "cve": "CVE-2022-31738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31738" }, { "cve": "CVE-2022-31739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31739" }, { "cve": "CVE-2022-3174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-3174" }, { "cve": "CVE-2022-31740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31740" }, { "cve": "CVE-2022-31741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31741" }, { "cve": "CVE-2022-31742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31742" }, { "cve": "CVE-2022-31747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31747" }, { "cve": "CVE-2022-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-4187" } ] }
wid-sec-w-2024-1186
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM DB2 REST ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1186 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1186.json" }, { "category": "self", "summary": "WID-SEC-2024-1186 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1186" }, { "category": "external", "summary": "IBM Security Bulletin - 7154484 vom 2024-05-20", "url": "https://www.ibm.com/support/pages/node/7154484" } ], "source_lang": "en-US", "title": "IBM DB2 REST: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-20T22:00:00.000+00:00", "generator": { "date": "2024-05-21T10:06:00.707+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1186", "initial_release_date": "2024-05-20T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-20T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "REST \u003c1.0.0.304-amd64", "product": { "name": "IBM DB2 REST \u003c1.0.0.304-amd64", "product_id": "T034928", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:rest__1.0.0.304-amd64" } } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19126", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2019-19126" }, { "cve": "CVE-2020-10029", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-10029" }, { "cve": "CVE-2020-1751", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-1752" }, { "cve": "CVE-2021-35942", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-35942" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-3999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-4160" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2023-48795" } ] }
wid-sec-w-2023-1969
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Fabric OS (FOS) ist ein Betriebssystem f\u00fcr FibreChannel Switches.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1969 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1969.json" }, { "category": "self", "summary": "WID-SEC-2023-1969 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1969" }, { "category": "external", "summary": "HPE Security Bulletin HPESBST04494 vom 2023-08-04", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" } ], "source_lang": "en-US", "title": "HPE Fabric OS: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2023-08-06T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:39:20.279+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1969", "initial_release_date": "2023-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1", "product": { "name": "HPE Fabric OS \u003c 9.1.1", "product_id": "T024587", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3c", "product": { "name": "HPE Fabric OS \u003c v8.2.3c", "product_id": "T024589", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3c" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 7.4.2j", "product": { "name": "HPE Fabric OS \u003c 7.4.2j", "product_id": "T029096", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:7.4.2j" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3d", "product": { "name": "HPE Fabric OS \u003c v8.2.3d", "product_id": "T029097", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3d" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.0.1e", "product": { "name": "HPE Fabric OS \u003c 9.0.1e", "product_id": "T029098", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.0.1e" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1c", "product": { "name": "HPE Fabric OS \u003c 9.1.1c", "product_id": "T029101", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1c" } } } ], "category": "product_name", "name": "Fabric OS" }, { "branches": [ { "category": "product_name", "name": "HPE Switch SAN", "product": { "name": "HPE Switch SAN", "product_id": "T029100", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:san_switch" } } }, { "category": "product_name", "name": "HPE Switch Fibre Channel", "product": { "name": "HPE Switch Fibre Channel", "product_id": "T029104", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:fibre_channel" } } } ], "category": "product_name", "name": "Switch" } ], "category": "vendor", "name": "HPE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-31928", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31928" }, { "cve": "CVE-2023-31927", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31927" }, { "cve": "CVE-2023-31926", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31926" }, { "cve": "CVE-2023-31432", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31432" }, { "cve": "CVE-2023-31431", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31431" }, { "cve": "CVE-2023-31430", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31430" }, { "cve": "CVE-2023-31429", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31429" }, { "cve": "CVE-2023-31428", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31428" }, { "cve": "CVE-2023-31427", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31427" }, { "cve": "CVE-2023-31426", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31426" }, { "cve": "CVE-2023-31425", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31425" }, { "cve": "CVE-2022-44792", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3786" }, { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-24448", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-24448" }, { "cve": "CVE-2022-23219", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-23219" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0322", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0322" }, { "cve": "CVE-2022-0155", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0155" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-41617", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-41617" }, { "cve": "CVE-2021-4145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-4145" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-3800", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-3800" }, { "cve": "CVE-2021-20193", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-20193" }, { "cve": "CVE-2021-0146", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-0146" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-14145" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2019-0220" }, { "cve": "CVE-2018-7738", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-7738" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2018-14404", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14348", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14348" }, { "cve": "CVE-2018-0739", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-0739" }, { "cve": "CVE-2014-2524", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2014-2524" }, { "cve": "CVE-2012-0060", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2012-0060" }, { "cve": "CVE-2011-4917", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2011-4917" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
wid-sec-w-2022-1057
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1057 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1057.json" }, { "category": "self", "summary": "WID-SEC-2022-1057 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1057" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-05-16", "url": "https://support.apple.com/en-us/HT213255" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-05-16", "url": "https://support.apple.com/en-us/HT213256" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-05-16", "url": "https://support.apple.com/en-us/HT213257" }, { "category": "external", "summary": "PoC CVE-2022-26726", "url": "https://github.com/acheong08/CVE-2022-26726-POC" }, { "category": "external", "summary": "CISA: Apple Releases Security Updates", "url": "https://www.cisa.gov/uscert/ncas/current-activity/2022/04/01/apple-releases-security-updates-0" }, { "category": "external", "summary": "Debian Security Advisory DLA-3118 vom 2022-09-22", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html" }, { "category": "external", "summary": "Wojciech Regula blogpost vom 2022-11-21", "url": "https://wojciechregula.blog/post/macos-sandbox-escape-via-terminal/" } ], "source_lang": "en-US", "title": "Apple macOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-21T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:55:42.487+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1057", "initial_release_date": "2022-05-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "3", "summary": "CVE Nummern CVE-2022-32790 und CVE-2022-32882 erg\u00e4nzt" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-09-25T22:00:00.000+00:00", "number": "5", "summary": "Korrektur bzgl. fehlerhaft eingetragenem Debian Update" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "6", "summary": "Exploit aufgenommen" }, { "date": "2023-06-21T22:00:00.000+00:00", "number": "7", "summary": "CVE-2022-32794 erg\u00e4nzt" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple macOS Catalina \u003c 2022-004", "product": { "name": "Apple macOS Catalina \u003c 2022-004", "product_id": "T023230", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:catalina__2022-004" } } }, { "category": "product_name", "name": "Apple macOS Big Sur \u003c 11.6.6", "product": { "name": "Apple macOS Big Sur \u003c 11.6.6", "product_id": "T023231", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:big_sur__11.6.6" } } }, { "category": "product_name", "name": "Apple macOS Monterey \u003c 12.4", "product": { "name": "Apple macOS Monterey \u003c 12.4", "product_id": "T023232", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:monterey__12.4" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32882", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-32882" }, { "cve": "CVE-2022-32794", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-32794" }, { "cve": "CVE-2022-32790", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-32790" }, { "cve": "CVE-2022-26776", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26776" }, { "cve": "CVE-2022-26775", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26775" }, { "cve": "CVE-2022-26772", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26772" }, { "cve": "CVE-2022-26770", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26770" }, { "cve": "CVE-2022-26769", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26769" }, { "cve": "CVE-2022-26768", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26768" }, { "cve": "CVE-2022-26767", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26767" }, { "cve": "CVE-2022-26766", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26766" }, { "cve": "CVE-2022-26765", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26765" }, { "cve": "CVE-2022-26764", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26764" }, { "cve": "CVE-2022-26763", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26763" }, { "cve": "CVE-2022-26762", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26762" }, { "cve": "CVE-2022-26761", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26761" }, { "cve": "CVE-2022-26757", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26757" }, { "cve": "CVE-2022-26756", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26756" }, { "cve": "CVE-2022-26755", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26755" }, { "cve": "CVE-2022-26754", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26754" }, { "cve": "CVE-2022-26753", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26753" }, { "cve": "CVE-2022-26752", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26752" }, { "cve": "CVE-2022-26751", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26751" }, { "cve": "CVE-2022-26750", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26750" }, { "cve": "CVE-2022-26749", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26749" }, { "cve": "CVE-2022-26748", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26748" }, { "cve": "CVE-2022-26746", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26746" }, { "cve": "CVE-2022-26745", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26745" }, { "cve": "CVE-2022-26743", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26743" }, { "cve": "CVE-2022-26742", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26742" }, { "cve": "CVE-2022-26741", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26741" }, { "cve": "CVE-2022-26740", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26740" }, { "cve": "CVE-2022-26739", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26739" }, { "cve": "CVE-2022-26738", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26738" }, { "cve": "CVE-2022-26737", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26737" }, { "cve": "CVE-2022-26736", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26736" }, { "cve": "CVE-2022-26731", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26731" }, { "cve": "CVE-2022-26728", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26728" }, { "cve": "CVE-2022-26727", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26727" }, { "cve": "CVE-2022-26726", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26726" }, { "cve": "CVE-2022-26725", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26725" }, { "cve": "CVE-2022-26723", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26723" }, { "cve": "CVE-2022-26722", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26722" }, { "cve": "CVE-2022-26721", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26721" }, { "cve": "CVE-2022-26720", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26720" }, { "cve": "CVE-2022-26719", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26719" }, { "cve": "CVE-2022-26718", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26718" }, { "cve": "CVE-2022-26717", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26717" }, { "cve": "CVE-2022-26716", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26716" }, { "cve": "CVE-2022-26715", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26715" }, { "cve": "CVE-2022-26714", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26714" }, { "cve": "CVE-2022-26712", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26712" }, { "cve": "CVE-2022-26711", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26711" }, { "cve": "CVE-2022-26710", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26710" }, { "cve": "CVE-2022-26709", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26709" }, { "cve": "CVE-2022-26708", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26708" }, { "cve": "CVE-2022-26706", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26706" }, { "cve": "CVE-2022-26704", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26704" }, { "cve": "CVE-2022-26701", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26701" }, { "cve": "CVE-2022-26700", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26700" }, { "cve": "CVE-2022-26698", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26698" }, { "cve": "CVE-2022-26697", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26697" }, { "cve": "CVE-2022-26696", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26696" }, { "cve": "CVE-2022-26694", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26694" }, { "cve": "CVE-2022-26693", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26693" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22677", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22677" }, { "cve": "CVE-2022-22675", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22675" }, { "cve": "CVE-2022-22674", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22674" }, { "cve": "CVE-2022-22665", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22665" }, { "cve": "CVE-2022-22663", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22663" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0530", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-0530" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2021-46059", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-46059" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2018-25032" } ] }
WID-SEC-W-2022-0200
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE und OpenJDK ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- NetApp Appliance\n- Sonstiges\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0200 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0200.json" }, { "category": "self", "summary": "WID-SEC-2022-0200 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0200" }, { "category": "external", "summary": "IBM Security Bulletin 7058364 vom 2023-10-24", "url": "https://www.ibm.com/support/pages/node/7058364" }, { "category": "external", "summary": "IBM Security Bulletin 7056031 vom 2023-10-19", "url": "https://www.ibm.com/support/pages/node/7056031" }, { "category": "external", "summary": "IBM Security Bulletin 7041681 vom 2023-10-04", "url": "https://www.ibm.com/support/pages/node/7041681" }, { "category": "external", "summary": "IBM Security Bulletin 7006407 vom 2023-06-23", "url": "https://www.ibm.com/support/pages/node/7006407" }, { "category": "external", "summary": "IBM Security Bulletin 6995887 vom 2023-05-19", "url": "https://aix.software.ibm.com/aix/efixes/security/java_may2023_advisory.asc" }, { "category": "external", "summary": "IBM Security Bulletin 6967221 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967221" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-038 vom 2022-06-08", "url": "https://download.avaya.com/css/public/documents/101082271" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1728 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:1728" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2137 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:2137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1729 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:1729" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2272 vom 2022-05-26", "url": "https://access.redhat.com/errata/RHSA-2022:2272" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-113 vom 2022-05-27", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-113/index.html" }, { "category": "external", "summary": "Release Notes f\u00fcr Security Event Manager", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2022-2-1_release_notes.htm" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4957 vom 2022-06-09", "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4959 vom 2022-06-09", "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "category": "external", "summary": "Oracle Critical Patch Update April 2022 - Appendix Oracle Java SE vom 2022-04-19", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA" }, { "category": "external", "summary": "OpenJDK Vulnerability Advisory", "url": "https://openjdk.java.net/groups/vulnerability/advisories/2022-04-19" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1440 vom 2022-04-20", "url": "http://linux.oracle.com/errata/ELSA-2022-1440.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1444 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1444" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1443 vom 2022-04-21", "url": "https://access.redhat.com/errata/RHSA-2022:1443" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1442 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1442" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1441 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1441" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1440 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1440" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1445 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1445" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1442 vom 2022-04-20", "url": "http://linux.oracle.com/errata/ELSA-2022-1442.html" }, { "category": "external", "summary": "CVE-2022-21449 PoC vom 2022-04-21", "url": "https://github.com/khalednassar/CVE-2022-21449-TLS-PoC" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1445 vom 2022-04-21", "url": "https://linux.oracle.com/errata/ELSA-2022-1445.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1490 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1490" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1491 vom 2022-04-26", "url": "http://linux.oracle.com/errata/ELSA-2022-1491.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1487 vom 2022-04-26", "url": "http://linux.oracle.com/errata/ELSA-2022-1487.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1491 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1491" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1489 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1489" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1487 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1488 vom 2022-04-25", "url": "https://access.redhat.com/errata/RHSA-2022:1488" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5388-1 vom 2022-04-26", "url": "https://ubuntu.com/security/notices/USN-5388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5388-2 vom 2022-04-26", "url": "https://ubuntu.com/security/notices/USN-5388-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1791 vom 2022-04-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1791.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1790 vom 2022-04-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1790.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1778 vom 2022-04-27", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1778.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-038 vom 2022-04-26", "url": "https://downloads.avaya.com/css/P8/documents/101081600" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1439 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1439" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1492 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1492" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-002 vom 2022-04-28", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1435 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1435" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-039 vom 2022-04-27", "url": "https://downloads.avaya.com/css/P8/documents/101081609" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1436 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1437 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1437" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1438 vom 2022-04-29", "url": "https://access.redhat.com/errata/RHSA-2022:1438" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220429-0006 vom 2022-04-29", "url": "https://security.netapp.com/advisory/ntap-20220429-0006/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1474-1 vom 2022-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1520 vom 2022-05-02", "url": "https://access.redhat.com/errata/RHSA-2022:1520" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1519 vom 2022-05-02", "url": "https://access.redhat.com/errata/RHSA-2022:1519" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1513-1 vom 2022-05-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5128 vom 2022-05-03", "url": "https://lists.debian.org/debian-security-announce/2022/msg00096.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1622 vom 2022-05-04", "url": "https://access.redhat.com/errata/RHSA-2022:1622" }, { "category": "external", "summary": "Debian Security Advisory DSA-5131 vom 2022-05-05", "url": "https://lists.debian.org/debian-security-announce/2022/msg00099.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1679 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1679" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2218 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2218" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2217 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2217" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2216 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2216" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1699 vom 2022-05-13", "url": "https://access.redhat.com/errata/RHSA-2022:1699" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:1487 vom 2022-05-13", "url": "https://lists.centos.org/pipermail/centos-announce/2022-May/073583.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3006 vom 2022-05-14", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:1440 vom 2022-05-13", "url": "https://lists.centos.org/pipermail/centos-announce/2022-May/073586.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1728 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-1728.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-2137 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-2137.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1729 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-1729.html" }, { "category": "external", "summary": "EMC Security Advisory DSA-2022-189 vom 2022-07-14", "url": "https://www.dell.com/support/kbdoc/de-de/000201463/dsa-2022-189-dell-emc-networker-runtime-environment-nre-security-update-for-java-se-embedded-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2540-1 vom 2022-07-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2530-1 vom 2022-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2531-1 vom 2022-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2539-1 vom 2022-07-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2650-1 vom 2022-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5837 vom 2022-08-03", "url": "https://access.redhat.com/errata/RHSA-2022:5837" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5546-2 vom 2022-08-04", "url": "https://ubuntu.com/security/notices/USN-5546-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5546-1 vom 2022-08-04", "url": "https://ubuntu.com/security/notices/USN-5546-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1631 vom 2022-08-23", "url": "https://alas.aws.amazon.com/ALAS-2022-1631.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3092-1 vom 2022-09-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1633 vom 2022-09-12", "url": "https://alas.aws.amazon.com/ALAS-2022-1633.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2JAVA-OPENJDK11-2022-002 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASJAVA-OPENJDK11-2022-002.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1835 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1835.html" }, { "category": "external", "summary": "IBM Security Bulletin 6824717 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-semeru-runtime-affect-spss-collaboration-and-deployment-services-cve-2022-21496-cve-2022-21426/" }, { "category": "external", "summary": "IBM Security Bulletin 6824713 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-java-runtime-affects-spss-collaboration-and-deployment-services-cve-2022-21496/" }, { "category": "external", "summary": "IBM Security Bulletin 6824763 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-txseries-for-multiplatforms-is-vulnerable-to-several-no-confidentiality-exposures-due-to-ibm-sdk-java-technology-edition/" }, { "category": "external", "summary": "IBM Security Bulletin 6825125 vom 2022-10-01", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-affected-by-multiple-vulnerabilities-in-ibm-runtime-environment-java-technology-edition-version-8/" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" } ], "source_lang": "en-US", "title": "Oracle Java SE und OpenJDK: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-24T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:47:10.128+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0200", "initial_release_date": "2022-04-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-04-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-04-21T22:00:00.000+00:00", "number": "3", "summary": "PoC f\u00fcr CVE-2022-21449 aufgenommen" }, { "date": "2022-04-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-04-25T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon und AVAYA aufgenommen" }, { "date": "2022-04-28T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat, Amazon und AVAYA aufgenommen" }, { "date": "2022-05-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von NetApp, Red Hat und SUSE aufgenommen" }, { "date": "2022-05-02T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-03T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2022-05-04T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-05T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-11T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-12T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-15T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von CentOS und Debian aufgenommen" }, { "date": "2022-05-19T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-22T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat und HITACHI aufgenommen" }, { "date": "2022-05-31T22:00:00.000+00:00", "number": "21", "summary": "Anpassung" }, { "date": "2022-06-08T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-19T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-13T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von EMC aufgenommen" }, { "date": "2022-07-24T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-23T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-28T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates aufgenommen" }, { "date": "2023-03-30T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-05-21T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-06-22T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "41" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Corretto", "product": { "name": "Amazon Corretto", "product_id": "T023017", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:-" } } }, { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya CMS", "product": { "name": "Avaya CMS", "product_id": "997", "product_identification_helper": { "cpe": "cpe:/a:avaya:call_management_system_server:-" } } }, { "category": "product_name", "name": "Avaya Session Border Controller", "product": { "name": "Avaya Session Border Controller", "product_id": "T015520", "product_identification_helper": { "cpe": "cpe:/h:avaya:session_border_controller:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "EMC NetWorker", "product": { "name": "EMC NetWorker", "product_id": "3479", "product_identification_helper": { "cpe": "cpe:/a:emc:networker:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM AIX 7.2", "product": { "name": "IBM AIX 7.2", "product_id": "434967", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } }, { "category": "product_name", "name": "IBM AIX 7.3", "product": { "name": "IBM AIX 7.3", "product_id": "T021486", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.3" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_name", "name": "IBM Java \u003c 7.1.5.17", "product": { "name": "IBM Java \u003c 7.1.5.17", "product_id": "T027013", "product_identification_helper": { "cpe": "cpe:/a:ibm:jre:7.1.5.17" } } }, { "category": "product_name", "name": "IBM Java \u003c 8.0.8.0", "product": { "name": "IBM Java \u003c 8.0.8.0", "product_id": "T027014", "product_identification_helper": { "cpe": "cpe:/a:ibm:jre:8.0.8.0" } } } ], "category": "product_name", "name": "Java" }, { "category": "product_name", "name": "IBM MQ", "product": { "name": "IBM MQ", "product_id": "T021398", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:-" } } }, { "category": "product_name", "name": "IBM Rational Build Forge \u003c 8.0.0.23", "product": { "name": "IBM Rational Build Forge \u003c 8.0.0.23", "product_id": "T024052", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.23" } } }, { "category": "product_name", "name": "IBM Rational Business Developer", "product": { "name": "IBM Rational Business Developer", "product_id": "T025611", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_business_developer:-" } } }, { "category": "product_name", "name": "IBM Rational ClearQuest \u003c 9.0.2.8", "product": { "name": "IBM Rational ClearQuest \u003c 9.0.2.8", "product_id": "T030204", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:9.0.2.8" } } }, { "category": "product_name", "name": "IBM SPSS 8.4", "product": { "name": "IBM SPSS 8.4", "product_id": "T024740", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:8.4" } } }, { "branches": [ { "category": "product_name", "name": "IBM TXSeries 9.1", "product": { "name": "IBM TXSeries 9.1", "product_id": "T015903", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_9.1" } } }, { "category": "product_name", "name": "IBM TXSeries 8.2", "product": { "name": "IBM TXSeries 8.2", "product_id": "T015904", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.2" } } } ], "category": "product_name", "name": "TXSeries" }, { "category": "product_name", "name": "IBM Tivoli Netcool/OMNIbus \u003c 8.1.0.31", "product": { "name": "IBM Tivoli Netcool/OMNIbus \u003c 8.1.0.31", "product_id": "T030747", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0.31" } } }, { "category": "product_name", "name": "IBM VIOS 3.1", "product": { "name": "IBM VIOS 3.1", "product_id": "1039165", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:3.1" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space \u003c 22.2R1", "product": { "name": "Juniper Junos Space \u003c 22.2R1", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "580789", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Java SE 21.3.1", "product": { "name": "Oracle Java SE 21.3.1", "product_id": "T022864", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:21.3.1" } } }, { "category": "product_name", "name": "Oracle Java SE 22.0.0.2", "product": { "name": "Oracle Java SE 22.0.0.2", "product_id": "T022865", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:22.0.0.2" } } }, { "category": "product_name", "name": "Oracle Java SE 11.0.14", "product": { "name": "Oracle Java SE 11.0.14", "product_id": "T022866", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:11.0.14" } } }, { "category": "product_name", "name": "Oracle Java SE 17.0.2", "product": { "name": "Oracle Java SE 17.0.2", "product_id": "T022867", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:17.0.2" } } }, { "category": "product_name", "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.5", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.5", "product_id": "T022909", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_20.3.5" } } }, { "category": "product_name", "name": "Oracle Java SE Oracle Java SE: 7u331", "product": { "name": "Oracle Java SE Oracle Java SE: 7u331", "product_id": "T022910", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_java_se_7u331" } } }, { "category": "product_name", "name": "Oracle Java SE 8u321", "product": { "name": "Oracle Java SE 8u321", "product_id": "T022911", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:8u321" } } }, { "category": "product_name", "name": "Oracle Java SE 18; Oracle GraalVM Enterprise Edition: 20.3.5", "product": { "name": "Oracle Java SE 18; Oracle GraalVM Enterprise Edition: 20.3.5", "product_id": "T022912", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:18_oracle_graalvm_enterprise_edition_20.3.5" } } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Oracle Java SE und OpenJDK existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T015904", "T003343", "T015903", "T030204", "67646", "T015127", "T015126", "T004914", "T015520", "T022866", "T022867", "3479", "T023017", "T022864", "997", "T022865", "T024740", "398363", "T025611", "T021398", "T027014", "T027013", "T024052", "T015518", "T015516", "434967", "1039165", "T022909", "T016960", "T016243", "T017562", "T022910", "T022911", "T022912", "2951", "T002207", "T000126", "580789", "T030747", "1727", "T021486" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21496" } ] }
WID-SEC-W-2022-0432
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0432 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json" }, { "category": "self", "summary": "WID-SEC-2022-0432 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX21A vom 2022-06-21", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:49:40.951+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0432", "initial_release_date": "2022-06-21T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26486" } ] }
WID-SEC-W-2022-0169
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "MySQL ist ein Open Source Datenbankserver von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- NetApp Appliance\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0169 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0169.json" }, { "category": "self", "summary": "WID-SEC-2022-0169 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0169" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5490-1 vom 2022-06-21", "url": "https://ubuntu.com/security/notices/USN-5490-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2003-1 vom 2022-06-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" }, { "category": "external", "summary": "Oracle Critical Patch Update April 2022 - Appendix Oracle MySQL vom 2022-04-19", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220429-0005 vom 2022-04-29", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5400-1 vom 2022-05-03", "url": "https://ubuntu.com/security/notices/USN-5400-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5400-2 vom 2022-05-04", "url": "https://ubuntu.com/security/notices/USN-5400-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5400-3 vom 2022-05-05", "url": "https://ubuntu.com/security/notices/USN-5400-3" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-098 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-098.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6306 vom 2022-09-01", "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6518 vom 2022-09-14", "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6590 vom 2022-09-21", "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6590 vom 2022-09-22", "url": "https://linux.oracle.com/errata/ELSA-2022-6590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1040-3 vom 2022-10-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012505.html" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" }, { "category": "external", "summary": "Oracle Linux Bulletin-October 2022 vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/linuxbulletinoct2022.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7119 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7119 vom 2022-10-27", "url": "https://linux.oracle.com/errata/ELSA-2022-7119.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-165 vom 2022-11-04", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-165.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7464 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7464" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7970 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7970" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7970 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-7970.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8860 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8860" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8847 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8847" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8893 vom 2022-12-15", "url": "https://access.redhat.com/errata/RHSA-2022:8893" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1931 vom 2023-02-06", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1931.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1676 vom 2023-02-06", "url": "https://alas.aws.amazon.com/ALAS-2023-1676.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-1948 vom 2023-02-22", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1948.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3433 vom 2024-05-28", "url": "https://access.redhat.com/errata/RHSA-2024:3433" } ], "source_lang": "en-US", "title": "Oracle MySQL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:08:02.957+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0169", "initial_release_date": "2022-04-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-05-01T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-05-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-05-04T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-05-05T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-06-07T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-21T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-10-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-18T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-11-06T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-07T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-15T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-06T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-02-22T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "26" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c22.2R1", "product": { "name": "Juniper Junos Space \u003c22.2R1", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "product_name", "name": "Junos Space" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c=8.0.29", "product": { "name": "Oracle MySQL \u003c=8.0.29", "product_id": "T022871", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.29" } } }, { "category": "product_version_range", "name": "\u003c=8.0.28", "product": { "name": "Oracle MySQL \u003c=8.0.28", "product_id": "T022872", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.28" } } }, { "category": "product_version_range", "name": "\u003c=5.7.37", "product": { "name": "Oracle MySQL \u003c=5.7.37", "product_id": "T022873", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:5.7.37" } } }, { "category": "product_version_range", "name": "\u003c=7.4.35", "product": { "name": "Oracle MySQL \u003c=7.4.35", "product_id": "T022874", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:7.4.35" } } }, { "category": "product_version_range", "name": "\u003c=7.5.25", "product": { "name": "Oracle MySQL \u003c=7.5.25", "product_id": "T022875", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:7.5.25" } } }, { "category": "product_version_range", "name": "\u003c=7.6.21", "product": { "name": "Oracle MySQL \u003c=7.6.21", "product_id": "T022876", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:7.6.21" } } } ], "category": "product_name", "name": "MySQL" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "367115", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22570", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-22570" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-42340", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-42340" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2021-44832" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21412", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21412" }, { "cve": "CVE-2022-21413", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21413" }, { "cve": "CVE-2022-21414", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21414" }, { "cve": "CVE-2022-21415", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21415" }, { "cve": "CVE-2022-21417", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21417" }, { "cve": "CVE-2022-21418", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21418" }, { "cve": "CVE-2022-21423", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21423" }, { "cve": "CVE-2022-21425", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21425" }, { "cve": "CVE-2022-21427", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21427" }, { "cve": "CVE-2022-21435", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21435" }, { "cve": "CVE-2022-21436", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21436" }, { "cve": "CVE-2022-21437", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21437" }, { "cve": "CVE-2022-21438", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21438" }, { "cve": "CVE-2022-21440", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21440" }, { "cve": "CVE-2022-21444", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21444" }, { "cve": "CVE-2022-21451", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21451" }, { "cve": "CVE-2022-21452", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21452" }, { "cve": "CVE-2022-21454", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21454" }, { "cve": "CVE-2022-21457", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21457" }, { "cve": "CVE-2022-21459", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21459" }, { "cve": "CVE-2022-21460", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21460" }, { "cve": "CVE-2022-21462", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21462" }, { "cve": "CVE-2022-21478", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21478" }, { "cve": "CVE-2022-21479", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21479" }, { "cve": "CVE-2022-21482", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21482" }, { "cve": "CVE-2022-21483", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21483" }, { "cve": "CVE-2022-21484", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21484" }, { "cve": "CVE-2022-21485", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21485" }, { "cve": "CVE-2022-21486", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21486" }, { "cve": "CVE-2022-21489", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21489" }, { "cve": "CVE-2022-21490", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-21490" }, { "cve": "CVE-2022-22965", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-22965" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "T002207", "67646", "T000126", "367115", "398363", "T004914", "T016960" ], "last_affected": [ "T022873", "T022874", "T022875", "T022876", "T022871", "T022872" ] }, "release_date": "2022-04-19T22:00:00Z", "title": "CVE-2022-23305" } ] }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2022-1057
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1057 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1057.json" }, { "category": "self", "summary": "WID-SEC-2022-1057 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1057" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-05-16", "url": "https://support.apple.com/en-us/HT213255" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-05-16", "url": "https://support.apple.com/en-us/HT213256" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-05-16", "url": "https://support.apple.com/en-us/HT213257" }, { "category": "external", "summary": "PoC CVE-2022-26726", "url": "https://github.com/acheong08/CVE-2022-26726-POC" }, { "category": "external", "summary": "CISA: Apple Releases Security Updates", "url": "https://www.cisa.gov/uscert/ncas/current-activity/2022/04/01/apple-releases-security-updates-0" }, { "category": "external", "summary": "Debian Security Advisory DLA-3118 vom 2022-09-22", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html" }, { "category": "external", "summary": "Wojciech Regula blogpost vom 2022-11-21", "url": "https://wojciechregula.blog/post/macos-sandbox-escape-via-terminal/" } ], "source_lang": "en-US", "title": "Apple macOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-21T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:55:42.487+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1057", "initial_release_date": "2022-05-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "3", "summary": "CVE Nummern CVE-2022-32790 und CVE-2022-32882 erg\u00e4nzt" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-09-25T22:00:00.000+00:00", "number": "5", "summary": "Korrektur bzgl. fehlerhaft eingetragenem Debian Update" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "6", "summary": "Exploit aufgenommen" }, { "date": "2023-06-21T22:00:00.000+00:00", "number": "7", "summary": "CVE-2022-32794 erg\u00e4nzt" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple macOS Catalina \u003c 2022-004", "product": { "name": "Apple macOS Catalina \u003c 2022-004", "product_id": "T023230", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:catalina__2022-004" } } }, { "category": "product_name", "name": "Apple macOS Big Sur \u003c 11.6.6", "product": { "name": "Apple macOS Big Sur \u003c 11.6.6", "product_id": "T023231", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:big_sur__11.6.6" } } }, { "category": "product_name", "name": "Apple macOS Monterey \u003c 12.4", "product": { "name": "Apple macOS Monterey \u003c 12.4", "product_id": "T023232", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:monterey__12.4" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32882", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-32882" }, { "cve": "CVE-2022-32794", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-32794" }, { "cve": "CVE-2022-32790", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-32790" }, { "cve": "CVE-2022-26776", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26776" }, { "cve": "CVE-2022-26775", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26775" }, { "cve": "CVE-2022-26772", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26772" }, { "cve": "CVE-2022-26770", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26770" }, { "cve": "CVE-2022-26769", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26769" }, { "cve": "CVE-2022-26768", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26768" }, { "cve": "CVE-2022-26767", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26767" }, { "cve": "CVE-2022-26766", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26766" }, { "cve": "CVE-2022-26765", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26765" }, { "cve": "CVE-2022-26764", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26764" }, { "cve": "CVE-2022-26763", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26763" }, { "cve": "CVE-2022-26762", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26762" }, { "cve": "CVE-2022-26761", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26761" }, { "cve": "CVE-2022-26757", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26757" }, { "cve": "CVE-2022-26756", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26756" }, { "cve": "CVE-2022-26755", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26755" }, { "cve": "CVE-2022-26754", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26754" }, { "cve": "CVE-2022-26753", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26753" }, { "cve": "CVE-2022-26752", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26752" }, { "cve": "CVE-2022-26751", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26751" }, { "cve": "CVE-2022-26750", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26750" }, { "cve": "CVE-2022-26749", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26749" }, { "cve": "CVE-2022-26748", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26748" }, { "cve": "CVE-2022-26746", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26746" }, { "cve": "CVE-2022-26745", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26745" }, { "cve": "CVE-2022-26743", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26743" }, { "cve": "CVE-2022-26742", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26742" }, { "cve": "CVE-2022-26741", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26741" }, { "cve": "CVE-2022-26740", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26740" }, { "cve": "CVE-2022-26739", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26739" }, { "cve": "CVE-2022-26738", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26738" }, { "cve": "CVE-2022-26737", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26737" }, { "cve": "CVE-2022-26736", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26736" }, { "cve": "CVE-2022-26731", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26731" }, { "cve": "CVE-2022-26728", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26728" }, { "cve": "CVE-2022-26727", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26727" }, { "cve": "CVE-2022-26726", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26726" }, { "cve": "CVE-2022-26725", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26725" }, { "cve": "CVE-2022-26723", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26723" }, { "cve": "CVE-2022-26722", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26722" }, { "cve": "CVE-2022-26721", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26721" }, { "cve": "CVE-2022-26720", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26720" }, { "cve": "CVE-2022-26719", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26719" }, { "cve": "CVE-2022-26718", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26718" }, { "cve": "CVE-2022-26717", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26717" }, { "cve": "CVE-2022-26716", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26716" }, { "cve": "CVE-2022-26715", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26715" }, { "cve": "CVE-2022-26714", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26714" }, { "cve": "CVE-2022-26712", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26712" }, { "cve": "CVE-2022-26711", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26711" }, { "cve": "CVE-2022-26710", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26710" }, { "cve": "CVE-2022-26709", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26709" }, { "cve": "CVE-2022-26708", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26708" }, { "cve": "CVE-2022-26706", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26706" }, { "cve": "CVE-2022-26704", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26704" }, { "cve": "CVE-2022-26701", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26701" }, { "cve": "CVE-2022-26700", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26700" }, { "cve": "CVE-2022-26698", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26698" }, { "cve": "CVE-2022-26697", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26697" }, { "cve": "CVE-2022-26696", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26696" }, { "cve": "CVE-2022-26694", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26694" }, { "cve": "CVE-2022-26693", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-26693" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22677", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22677" }, { "cve": "CVE-2022-22675", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22675" }, { "cve": "CVE-2022-22674", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22674" }, { "cve": "CVE-2022-22665", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22665" }, { "cve": "CVE-2022-22663", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22663" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0530", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-0530" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2021-46059", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-46059" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2022-05-16T22:00:00Z", "title": "CVE-2018-25032" } ] }
wid-sec-w-2022-1335
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1335 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json" }, { "category": "self", "summary": "WID-SEC-2022-1335 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-021 vom 2022-09-07", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:57:44.642+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1335", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2021-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-0561" }, { "cve": "CVE-2021-21708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-21708" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-30809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30897" }, { "cve": "CVE-2021-30934", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30934" }, { "cve": "CVE-2021-30936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30936" }, { "cve": "CVE-2021-30951", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30951" }, { "cve": "CVE-2021-30952", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30952" }, { "cve": "CVE-2021-30953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30953" }, { "cve": "CVE-2021-30954", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30954" }, { "cve": "CVE-2021-30984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30984" }, { "cve": "CVE-2021-3448", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-3448" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-4115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4115" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4217" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-45481", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45481" }, { "cve": "CVE-2021-45482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45482" }, { "cve": "CVE-2021-45483", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45483" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0156", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0156" }, { "cve": "CVE-2022-0158", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0158" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0408" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0417" }, { "cve": "CVE-2022-0443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0443" }, { "cve": "CVE-2022-0554", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0554" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0572" }, { "cve": "CVE-2022-0629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0629" }, { "cve": "CVE-2022-0685", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0685" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0714", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0714" }, { "cve": "CVE-2022-0729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0729" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1097" }, { "cve": "CVE-2022-1196", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1196" }, { "cve": "CVE-2022-1197", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1197" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1520", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1520" }, { "cve": "CVE-2022-1834", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1834" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21514", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21514" }, { "cve": "CVE-2022-21524", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21524" }, { "cve": "CVE-2022-21533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21533" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-22590", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22590" }, { "cve": "CVE-2022-22592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22592" }, { "cve": "CVE-2022-22620", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22620" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24130", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24130" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24713", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24713" }, { "cve": "CVE-2022-24801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24801" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25762" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26486" }, { "cve": "CVE-2022-28281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28281" }, { "cve": "CVE-2022-28282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28282" }, { "cve": "CVE-2022-28285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28285" }, { "cve": "CVE-2022-28286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28286" }, { "cve": "CVE-2022-28289", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28289" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28346", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28346" }, { "cve": "CVE-2022-28347", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28347" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-29909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29909" }, { "cve": "CVE-2022-29911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29911" }, { "cve": "CVE-2022-29912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29912" }, { "cve": "CVE-2022-29913", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29913" }, { "cve": "CVE-2022-29914", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29914" }, { "cve": "CVE-2022-29916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29916" }, { "cve": "CVE-2022-29917", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29917" }, { "cve": "CVE-2022-31736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31736" }, { "cve": "CVE-2022-31737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31737" }, { "cve": "CVE-2022-31738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31738" }, { "cve": "CVE-2022-31739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31739" }, { "cve": "CVE-2022-3174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-3174" }, { "cve": "CVE-2022-31740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31740" }, { "cve": "CVE-2022-31741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31741" }, { "cve": "CVE-2022-31742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31742" }, { "cve": "CVE-2022-31747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31747" }, { "cve": "CVE-2022-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-4187" } ] }
wid-sec-w-2022-0432
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0432 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json" }, { "category": "self", "summary": "WID-SEC-2022-0432 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX21A vom 2022-06-21", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:49:40.951+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0432", "initial_release_date": "2022-06-21T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26486" } ] }
ssa-108696
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIDIS Prime before V4.0.400 is affected by multiple vulnerabilities in the components OPC UA and OpenSSL, that could allow an unauthenticated attacker with access to the network where SIDIS Prime is installed to reuse OPC UA client credentials, create a denial of service condition of the SIDIS Prime OPC UA client, or create a denial of service condition of the SIDIS Prime TLS service.\n\nSiemens has released a new version of SIDIS Prime and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-108696.html" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-108696.json" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-108696.pdf" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-108696.txt" } ], "title": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400", "tracking": { "current_release_date": "2024-02-13T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-108696", "initial_release_date": "2024-02-13T00:00:00Z", "revision_history": [ { "date": "2024-02-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.400", "product": { "name": "SIDIS Prime", "product_id": "1" } } ], "category": "product_name", "name": "SIDIS Prime" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19135", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "CVE-2019-19135: Enable encrypted communication between the affected product (OPC UA client) and the OPC UA server(s)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19135" }, { "cve": "CVE-2020-1967", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-29862", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-29862" } ] }
SSA-108696
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIDIS Prime before V4.0.400 is affected by multiple vulnerabilities in the components OPC UA and OpenSSL, that could allow an unauthenticated attacker with access to the network where SIDIS Prime is installed to reuse OPC UA client credentials, create a denial of service condition of the SIDIS Prime OPC UA client, or create a denial of service condition of the SIDIS Prime TLS service.\n\nSiemens has released a new version of SIDIS Prime and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-108696.html" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-108696.json" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-108696.pdf" }, { "category": "self", "summary": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-108696.txt" } ], "title": "SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400", "tracking": { "current_release_date": "2024-02-13T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-108696", "initial_release_date": "2024-02-13T00:00:00Z", "revision_history": [ { "date": "2024-02-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.400", "product": { "name": "SIDIS Prime", "product_id": "1" } } ], "category": "product_name", "name": "SIDIS Prime" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19135", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "CVE-2019-19135: Enable encrypted communication between the affected product (OPC UA client) and the OPC UA server(s)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-19135" }, { "cve": "CVE-2020-1967", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-29862", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.400 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-29862" } ] }
SSA-712929
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A vulnerability in the openSSL component (CVE-2022-0778, [0]) could allow an attacker to create a denial of service condition by providing specially crafted elliptic curve certificates to products that use a vulnerable version of openSSL.\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.\n\n[0] \nhttps://www.openssl.org/news/secadv/20220315.txt", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-712929.html" }, { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-712929.json" }, { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-712929.txt" } ], "title": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products", "tracking": { "current_release_date": "2024-05-14T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-712929", "initial_release_date": "2022-06-14T00:00:00Z", "revision_history": [ { "date": "2022-06-14T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2022-07-12T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added SCALANCE X-200, X-200 IRT, X-300, XM-400, XR-500, XR-300WG, XB-200, XC-200, XF-200, XP-200 product families and Security Configuration Tool (SCT) as affected; added fix for RUGGEDCOM ROX devices and SIMATIC MV500 devices; no fix planned for SIMATIC NET PC Software, SIMATIC CP 343-1 Advanced and SIMATIC CP 443-1 Advanced (incl. SIPLUS NET variants)" }, { "date": "2022-08-09T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix for Industrial Edge - OPC UA Connector, SIMATIC Cloud Connect 7 gateways, SIMATIC Logon, SIMATIC PDM, SIMATIC STEP 7 V5.X and TeleControl Server Basic; added SCALANCE W1750D as affected; clarified that Industrial Edge - PROFINET IO Connector is not affected" }, { "date": "2022-09-13T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added fix for RUGGEDCOM CROSSBOW Station Access Controller (SAC), SCALANCE XM-400 and XR-500 product families, and SINEC INS" }, { "date": "2022-10-11T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added fix for SIMATIC WinCC Unified, TIA Portal V17, and SINEC NMS; added SCALANCE W-700 and W-1700 product families as affected; corrected several product names in the SCALANCE XB and XP product families" }, { "date": "2022-12-13T00:00:00Z", "legacy_version": "1.5", "number": "6", "summary": "Added SIMATIC Process Historian and SIMATIC HMI Unified Comfort Panels; added fix for SIMATIC PCS neo, SIMATIC Drive Controller family, SIMATIC S7-PLCSIM Advanced, SIMATIC S7-1500 and S7-1200 CPU families, and TIA Administrator; no fix planned for TIA Portal V16" }, { "date": "2023-01-10T00:00:00Z", "legacy_version": "1.6", "number": "7", "summary": "Added fix for SCALANCE W-700 IEEE 802.11ax product family" }, { "date": "2023-02-14T00:00:00Z", "legacy_version": "1.7", "number": "8", "summary": "Added fix for SCALANCE W1750D product family" }, { "date": "2023-03-14T00:00:00Z", "legacy_version": "1.8", "number": "9", "summary": "Added fix for SIMATIC CP 1542SP-1 and SIMATIC CP 1543SP-1, RUGGEDCOM RM1224 family, SCALANCE M-800 family, SCALANCE MUM-800 family, SCALANCE S615. Added missing affected products SCALANCE M876-4 (6GK5876-4AA10-2BA2) and SCALANCE S615 EEC (6GK5615-0AA01- 2AA2)" }, { "date": "2023-04-11T00:00:00Z", "legacy_version": "1.9", "number": "10", "summary": "Added fix for SCALANCE X-200IRT family, SIMATIC CP 443-1 Advanced, TIM 1531 IRC, SCALANCE XB-200, XC-200, XP-200, XF-200BA, XR-300WG family, and for SIMATIC WinCC" }, { "date": "2023-05-09T00:00:00Z", "legacy_version": "2.0", "number": "11", "summary": "Added fix for SIMATIC S7-1500 Software Controller; fix planned for SIMATIC NET PC Software V17" }, { "date": "2023-06-13T00:00:00Z", "legacy_version": "2.1", "number": "12", "summary": "Added fix for SIMOTION; clarified that no fix is planned for V8.2, V9.0, V9.1 of OpenPCS 7 and for V8.2, V9.0 of SIMATIC PCS 7; added fix and mitigation information for SIMATIC PCS 7 V9.1" }, { "date": "2023-07-11T00:00:00Z", "legacy_version": "2.2", "number": "13", "summary": "Expanded SIMATIC S7-1500 CPU family to individual products/MLFBs and added additional fix for V2 firmware version line; Fix for SIMATIC Drive Controller available already with V2.9.7" }, { "date": "2023-09-12T00:00:00Z", "legacy_version": "2.3", "number": "14", "summary": "Clarified SIMATIC S7-1500 Software Controller versions and adjusted fix for SIMATIC S7-1500 Software Controller V2; Clarified SIMATIC ET 200SP Open Controller versions and added fix for SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)" }, { "date": "2023-10-10T00:00:00Z", "legacy_version": "2.4", "number": "15", "summary": "Added fix for SIMATIC CP 1242-7 V2 family, SIMATIC CP 1243-1 family, SIMATIC CP 1243-7 LTE family, SIMATIC CP 1243-8 IRC and for SIMATIC NET PC Software V17" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "2.5", "number": "16", "summary": "Added fix for SIMATIC PCS 7 TeleControl; Clarified that no fix is planned for SINAUT Software ST7sc and SINAUT ST7CC" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "2.6", "number": "17", "summary": "Added fix for SIMATIC CP 1543-1 (incl. SIPLUS variants); Updated fix for TIM 1531 IRC (incl. SIPLUS NET variants)" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "2.7", "number": "18", "summary": "Expanded SIMATIC WinCC family to individual version lines; SIMATIC PCS 7 V9.1: clarified that V9.1 SP2 UC04 fixes the issue in SIMATIC WinCC" } ], "status": "interim", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.7", "product": { "name": "Industrial Edge - OPC UA Connector", "product_id": "1" } } ], "category": "product_name", "name": "Industrial Edge - OPC UA Connector" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV1.7", "product": { "name": "Industrial Edge - SIMATIC S7 Connector App", "product_id": "2" } } ], "category": "product_name", "name": "Industrial Edge - SIMATIC S7 Connector App" }, { "branches": [ { "category": "product_version_range", "name": "All versions (OPC UA interface only)", "product": { "name": "OpenPCS 7 V8.2", "product_id": "3" } } ], "category": "product_name", "name": "OpenPCS 7 V8.2" }, { "branches": [ { "category": "product_version_range", "name": "All versions (OPC UA interface only)", "product": { "name": "OpenPCS 7 V9.0", "product_id": "4" } } ], "category": "product_name", "name": "OpenPCS 7 V9.0" }, { "branches": [ { "category": "product_version_range", "name": "All versions (OPC UA interface only)", "product": { "name": "OpenPCS 7 V9.1", "product_id": "5" } } ], "category": "product_name", "name": "OpenPCS 7 V9.1" }, { "branches": [ { "category": "product_version_range", "name": "All versions only when running on ROX II \u003c V2.15.1", "product": { "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)", "product_id": "6" } } ], "category": "product_name", "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)", "product_id": "7", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2BA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)", "product_id": "8", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2DA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000", "product_id": "9" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000RE", "product_id": "10" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000RE" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1400", "product_id": "11" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1400" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1500", "product_id": "12" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1500" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1501", "product_id": "13" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1501" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1510", "product_id": "14" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1510" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1511", "product_id": "15" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1511" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1512", "product_id": "16" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1512" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1524", "product_id": "17" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1524" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1536", "product_id": "18" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1536" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX5000", "product_id": "19" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX5000" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)", "product_id": "20", "product_identification_helper": { "model_numbers": [ "6GK5998-3GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)", "product_id": "21", "product_identification_helper": { "model_numbers": [ "6GK5804-0AP00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)", "product_id": "22", "product_identification_helper": { "model_numbers": [ "6GK5812-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)", "product_id": "23", "product_identification_helper": { "model_numbers": [ "6GK5812-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)", "product_id": "24", "product_identification_helper": { "model_numbers": [ "6GK5816-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)", "product_id": "25", "product_identification_helper": { "model_numbers": [ "6GK5816-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)", "product_id": "26", "product_identification_helper": { "model_numbers": [ "6GK5826-2AB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)", "product_id": "27", "product_identification_helper": { "model_numbers": [ "6GK5874-2AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)", "product_id": "28", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)", "product_id": "29", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)", "product_id": "30", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2EA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)", "product_id": "31", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA10-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)", "product_id": "32", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)", "product_id": "33", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2DA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)", "product_id": "34", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA00-2DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)", "product_id": "35", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)", "product_id": "36", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)", "product_id": "37", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)", "product_id": "38", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA01-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)", "product_id": "39", "product_identification_helper": { "model_numbers": [ "6GK5622-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)", "product_id": "40", "product_identification_helper": { "model_numbers": [ "6GK5632-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)", "product_id": "41", "product_identification_helper": { "model_numbers": [ "6GK5636-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)", "product_id": "42", "product_identification_helper": { "model_numbers": [ "6GK5642-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)", "product_id": "43", "product_identification_helper": { "model_numbers": [ "6GK5646-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)", "product_id": "44", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)", "product_id": "45", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)", "product_id": "46", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)", "product_id": "47", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)", "product_id": "48", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)", "product_id": "49", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)", "product_id": "50", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)", "product_id": "51", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)", "product_id": "52", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)", "product_id": "53", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)", "product_id": "54", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)", "product_id": "55", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)", "product_id": "56", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)", "product_id": "57", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)", "product_id": "58", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)", "product_id": "59", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)", "product_id": "60", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)", "product_id": "61", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)", "product_id": "62", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)", "product_id": "63", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)", "product_id": "64", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)", "product_id": "65", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)", "product_id": "66", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)", "product_id": "67", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)", "product_id": "68", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)", "product_id": "69", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)", "product_id": "70", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)", "product_id": "71", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)", "product_id": "72", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)", "product_id": "73", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)", "product_id": "74", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)", "product_id": "75", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)", "product_id": "76", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)", "product_id": "77", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)", "product_id": "78", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)", "product_id": "79", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)", "product_id": "80", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)", "product_id": "81", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)", "product_id": "82", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)", "product_id": "83", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)", "product_id": "84", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)", "product_id": "85", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)", "product_id": "86", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)", "product_id": "87", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)", "product_id": "88", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)", "product_id": "89", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)", "product_id": "90", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)", "product_id": "91", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)", "product_id": "92", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)", "product_id": "93", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)", "product_id": "94", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)", "product_id": "95", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AD0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)", "product_id": "96", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)", "product_id": "97", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)", "product_id": "98", "product_identification_helper": { "model_numbers": [ "6GK5788-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)", "product_id": "99", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)", "product_id": "100", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)", "product_id": "101", "product_identification_helper": { "model_numbers": [ "6GK5788-2HY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)", "product_id": "102", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)", "product_id": "103", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)", "product_id": "104", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)", "product_id": "105", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)", "product_id": "106", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)", "product_id": "107", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)", "product_id": "108", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)", "product_id": "109", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)", "product_id": "110", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)", "product_id": "111", "product_identification_helper": { "model_numbers": [ "6GK5200-4AH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)", "product_id": "112", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)", "product_id": "113", "product_identification_helper": { "model_numbers": [ "6GK5201-3JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)", "product_id": "114", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)", "product_id": "115", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)", "product_id": "116", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)", "product_id": "117", "product_identification_helper": { "model_numbers": [ "6GK5202-2JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)", "product_id": "118", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)", "product_id": "119", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB11-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)", "product_id": "120", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)", "product_id": "121", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)", "product_id": "122", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)", "product_id": "123", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)", "product_id": "124", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)", "product_id": "125", "product_identification_helper": { "model_numbers": [ "6GK5204-0JA00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)", "product_id": "126", "product_identification_helper": { "model_numbers": [ "6GK5206-1BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)", "product_id": "127", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)", "product_id": "128", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)", "product_id": "129", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA10-2AA6" ] } } } ], "category": "product_name", "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)", "product_id": "130", "product_identification_helper": { "model_numbers": [ "6GK5212-2BB00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)", "product_id": "131", "product_identification_helper": { "model_numbers": [ "6GK5212-2BC00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)", "product_id": "132", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)", "product_id": "133", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)", "product_id": "134", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)", "product_id": "135", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)", "product_id": "136", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)", "product_id": "137", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)", "product_id": "138", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)", "product_id": "139", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)", "product_id": "140", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)", "product_id": "141", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)", "product_id": "142", "product_identification_helper": { "model_numbers": [ "6GK5304-2BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)", "product_id": "143", "product_identification_helper": { "model_numbers": [ "6GK5306-1BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)", "product_id": "144", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)", "product_id": "145", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)", "product_id": "146", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)", "product_id": "147", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)", "product_id": "148", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)", "product_id": "149", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)", "product_id": "150", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)", "product_id": "151", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)", "product_id": "152", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)", "product_id": "153", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)", "product_id": "154", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)", "product_id": "155", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)", "product_id": "156", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)", "product_id": "157", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)", "product_id": "158", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)", "product_id": "159", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)", "product_id": "160", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)", "product_id": "161", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)", "product_id": "162", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)", "product_id": "163", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)", "product_id": "164", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)", "product_id": "165", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)", "product_id": "166", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)", "product_id": "167", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)", "product_id": "168", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)", "product_id": "169", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)", "product_id": "170", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)", "product_id": "171", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)", "product_id": "172", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)", "product_id": "173", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)", "product_id": "174", "product_identification_helper": { "model_numbers": [ "6GK5320-1BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)", "product_id": "175", "product_identification_helper": { "model_numbers": [ "6GK5320-3BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)", "product_id": "176", "product_identification_helper": { "model_numbers": [ "6GK5408-2FD00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)", "product_id": "177", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)", "product_id": "178", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)", "product_id": "179", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)", "product_id": "180", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)", "product_id": "181", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)", "product_id": "182", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)", "product_id": "183", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)", "product_id": "184", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)", "product_id": "185", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)", "product_id": "186", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)", "product_id": "187", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)", "product_id": "188", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)", "product_id": "189", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)", "product_id": "190", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)", "product_id": "191", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)", "product_id": "192", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)", "product_id": "193", "product_identification_helper": { "model_numbers": [ "6GK5206-2BD00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)", "product_id": "194", "product_identification_helper": { "model_numbers": [ "6GK5206-2BB00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)", "product_id": "195", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)", "product_id": "196", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)", "product_id": "197", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)", "product_id": "198", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)", "product_id": "199", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)", "product_id": "200", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)", "product_id": "201", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)", "product_id": "202", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)", "product_id": "203", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)", "product_id": "204", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)", "product_id": "205", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)", "product_id": "206", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)", "product_id": "207", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)", "product_id": "208", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)", "product_id": "209", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)", "product_id": "210", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)", "product_id": "211", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)", "product_id": "212", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)", "product_id": "213", "product_identification_helper": { "model_numbers": [ "6GK5216-4BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)", "product_id": "214", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)", "product_id": "215", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)", "product_id": "216", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)", "product_id": "217", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)", "product_id": "218", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)", "product_id": "219", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)", "product_id": "220", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)", "product_id": "221", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)", "product_id": "222", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)", "product_id": "223", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)", "product_id": "224", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)", "product_id": "225", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)", "product_id": "226", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)", "product_id": "227", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)", "product_id": "228", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)", "product_id": "229", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)", "product_id": "230", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)", "product_id": "231", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)", "product_id": "232", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)", "product_id": "233", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)", "product_id": "234", "product_identification_helper": { "model_numbers": [ "6GK5408-4GP00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)", "product_id": "235", "product_identification_helper": { "model_numbers": [ "6GK5408-4GQ00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)", "product_id": "236", "product_identification_helper": { "model_numbers": [ "6GK5408-8GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)", "product_id": "237", "product_identification_helper": { "model_numbers": [ "6GK5408-8GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)", "product_id": "238", "product_identification_helper": { "model_numbers": [ "6GK5416-4GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)", "product_id": "239", "product_identification_helper": { "model_numbers": [ "6GK5416-4GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)", "product_id": "240", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)", "product_id": "241", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)", "product_id": "242", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)", "product_id": "243", "product_identification_helper": { "model_numbers": [ "6GK5208-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)", "product_id": "244", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)", "product_id": "245", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)", "product_id": "246", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)", "product_id": "247", "product_identification_helper": { "model_numbers": [ "6GK5216-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)", "product_id": "248", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)", "product_id": "249", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)", "product_id": "250", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)", "product_id": "251", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)", "product_id": "252", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)", "product_id": "253", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)", "product_id": "254", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)", "product_id": "255", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)", "product_id": "256", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)", "product_id": "257", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)", "product_id": "258", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)", "product_id": "259", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)", "product_id": "260", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)", "product_id": "261", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)", "product_id": "262", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)", "product_id": "263", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)", "product_id": "264", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)", "product_id": "265", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)", "product_id": "266", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)", "product_id": "267", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)", "product_id": "268", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)", "product_id": "269", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)", "product_id": "270", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)", "product_id": "271", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)", "product_id": "272", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)", "product_id": "273", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)", "product_id": "274", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)", "product_id": "275", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)", "product_id": "276", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)", "product_id": "277", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)", "product_id": "278", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)", "product_id": "279", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)", "product_id": "280", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)", "product_id": "281", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)", "product_id": "282", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)", "product_id": "283", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)", "product_id": "284", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)", "product_id": "285", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)", "product_id": "286", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)", "product_id": "287", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)", "product_id": "288", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)", "product_id": "289", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)", "product_id": "290", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)", "product_id": "291", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)", "product_id": "292", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)", "product_id": "293", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)", "product_id": "294", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)", "product_id": "295", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)", "product_id": "296", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)", "product_id": "297", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)", "product_id": "298", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)", "product_id": "299", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)", "product_id": "300", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)", "product_id": "301", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)", "product_id": "302", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)", "product_id": "303", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)", "product_id": "304", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)", "product_id": "305", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)", "product_id": "306", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)", "product_id": "307", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)", "product_id": "308", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Security Configuration Tool (SCT)", "product_id": "309" } } ], "category": "product_name", "name": "Security Configuration Tool (SCT)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)", "product_id": "310", "product_identification_helper": { "model_numbers": [ "6GK1411-1AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)", "product_id": "311", "product_identification_helper": { "model_numbers": [ "6GK1411-5AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)", "product_id": "312", "product_identification_helper": { "model_numbers": [ "6GK7343-1GX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)", "product_id": "313", "product_identification_helper": { "model_numbers": [ "6GK7443-1GX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "314", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)", "product_id": "315", "product_identification_helper": { "model_numbers": [ "6GK7242-7KX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)", "product_id": "316", "product_identification_helper": { "model_numbers": [ "6GK7243-1BX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)", "product_id": "317", "product_identification_helper": { "model_numbers": [ "6GK7243-7KX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)", "product_id": "318", "product_identification_helper": { "model_numbers": [ "6GK7243-7SX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)", "product_id": "319", "product_identification_helper": { "model_numbers": [ "6GK7243-8RX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "320", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.37", "product": { "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)", "product_id": "321", "product_identification_helper": { "model_numbers": [ "6GK7543-1AX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "322", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)", "product_id": "323", "product_identification_helper": { "model_numbers": [ "6GK7545-1GX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1626 (6GK1162-6AA01)", "product_id": "324", "product_identification_helper": { "model_numbers": [ "6GK1162-6AA01" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1626 (6GK1162-6AA01)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1628 (6GK1162-8AA00)", "product_id": "325", "product_identification_helper": { "model_numbers": [ "6GK1162-8AA00" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1628 (6GK1162-8AA00)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)", "product_id": "326", "product_identification_helper": { "model_numbers": [ "6ES7615-4DF10-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0)", "product_id": "327", "product_identification_helper": { "model_numbers": [ "6ES7615-7DF10-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.9.7", "product": { "name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)", "product_id": "328" } } ], "category": "product_name", "name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV18", "product": { "name": "SIMATIC HMI Unified Comfort Panels", "product_id": "329" } } ], "category": "product_name", "name": "SIMATIC HMI Unified Comfort Panels" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.6 Upd6", "product": { "name": "SIMATIC Logon V1.6", "product_id": "330" } } ], "category": "product_name", "name": "SIMATIC Logon V1.6" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV540 H (6GF3540-0GE10)", "product_id": "331", "product_identification_helper": { "model_numbers": [ "6GF3540-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 H (6GF3540-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV540 S (6GF3540-0CD10)", "product_id": "332", "product_identification_helper": { "model_numbers": [ "6GF3540-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 S (6GF3540-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV550 H (6GF3550-0GE10)", "product_id": "333", "product_identification_helper": { "model_numbers": [ "6GF3550-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 H (6GF3550-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV550 S (6GF3550-0CD10)", "product_id": "334", "product_identification_helper": { "model_numbers": [ "6GF3550-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 S (6GF3550-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV560 U (6GF3560-0LE10)", "product_id": "335", "product_identification_helper": { "model_numbers": [ "6GF3560-0LE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 U (6GF3560-0LE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV560 X (6GF3560-0HE10)", "product_id": "336", "product_identification_helper": { "model_numbers": [ "6GF3560-0HE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 X (6GF3560-0HE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V14", "product_id": "337" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V14" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V15", "product_id": "338" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V15" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V16 Update 6", "product": { "name": "SIMATIC NET PC Software V16", "product_id": "339" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V16" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 SP1 Update 1", "product": { "name": "SIMATIC NET PC Software V17", "product_id": "340" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V17" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.1 Update 1", "product": { "name": "SIMATIC PCS 7 TeleControl", "product_id": "341" } } ], "category": "product_name", "name": "SIMATIC PCS 7 TeleControl" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC PCS 7 V8.2", "product_id": "342" } } ], "category": "product_name", "name": "SIMATIC PCS 7 V8.2" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC PCS 7 V9.0", "product_id": "343" } } ], "category": "product_name", "name": "SIMATIC PCS 7 V9.0" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.1 SP2 UC04", "product": { "name": "SIMATIC PCS 7 V9.1", "product_id": "344" } } ], "category": "product_name", "name": "SIMATIC PCS 7 V9.1" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0", "product": { "name": "SIMATIC PCS neo (Administration Console)", "product_id": "345" } } ], "category": "product_name", "name": "SIMATIC PCS neo (Administration Console)" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.2 SP2", "product": { "name": "SIMATIC PDM", "product_id": "346" } } ], "category": "product_name", "name": "SIMATIC PDM" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V2020 SP1 Update 1", "product": { "name": "SIMATIC Process Historian OPC UA Server", "product_id": "347" } } ], "category": "product_name", "name": "SIMATIC Process Historian OPC UA Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF166C (6GT2002-0EE20)", "product_id": "348", "product_identification_helper": { "model_numbers": [ "6GT2002-0EE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF166C (6GT2002-0EE20)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF185C (6GT2002-0JE10)", "product_id": "349", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE10" ] } } } ], "category": "product_name", "name": "SIMATIC RF185C (6GT2002-0JE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF186C (6GT2002-0JE20)", "product_id": "350", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF186C (6GT2002-0JE20)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF186CI (6GT2002-0JE50)", "product_id": "351", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE50" ] } } } ], "category": "product_name", "name": "SIMATIC RF186CI (6GT2002-0JE50)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF188C (6GT2002-0JE40)", "product_id": "352", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE40" ] } } } ], "category": "product_name", "name": "SIMATIC RF188C (6GT2002-0JE40)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF188CI (6GT2002-0JE60)", "product_id": "353", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE60" ] } } } ], "category": "product_name", "name": "SIMATIC RF188CI (6GT2002-0JE60)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF360R (6GT2801-5BA30)", "product_id": "354", "product_identification_helper": { "model_numbers": [ "6GT2801-5BA30" ] } } } ], "category": "product_name", "name": "SIMATIC RF360R (6GT2801-5BA30)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF610R (6GT2811-6BC10)", "product_id": "355", "product_identification_helper": { "model_numbers": [ "6GT2811-6BC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF610R (6GT2811-6BC10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF615R (6GT2811-6CC10)", "product_id": "356", "product_identification_helper": { "model_numbers": [ "6GT2811-6CC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF615R (6GT2811-6CC10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF650R (6GT2811-6AB20)", "product_id": "357", "product_identification_helper": { "model_numbers": [ "6GT2811-6AB20" ] } } } ], "category": "product_name", "name": "SIMATIC RF650R (6GT2811-6AB20)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF680R (6GT2811-6AA10)", "product_id": "358", "product_identification_helper": { "model_numbers": [ "6GT2811-6AA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF680R (6GT2811-6AA10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF685R (6GT2811-6CA10)", "product_id": "359", "product_identification_helper": { "model_numbers": [ "6GT2811-6CA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF685R (6GT2811-6CA10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.6.0", "product": { "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "product_id": "360" } } ], "category": "product_name", "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0)", "product_id": "361", "product_identification_helper": { "model_numbers": [ "6ES7510-1SJ00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0)", "product_id": "362", "product_identification_helper": { "model_numbers": [ "6ES7510-1SJ01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0)", "product_id": "363", "product_identification_helper": { "model_numbers": [ "6ES7510-1DJ00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0)", "product_id": "364", "product_identification_helper": { "model_numbers": [ "6ES7510-1DJ01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK00-0AB0)", "product_id": "365", "product_identification_helper": { "model_numbers": [ "6ES7511-1AK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0)", "product_id": "366", "product_identification_helper": { "model_numbers": [ "6ES7511-1AK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0)", "product_id": "367", "product_identification_helper": { "model_numbers": [ "6ES7511-1AK02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0)", "product_id": "368", "product_identification_helper": { "model_numbers": [ "6ES7511-1CK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0)", "product_id": "369", "product_identification_helper": { "model_numbers": [ "6ES7511-1CK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK00-0AB0)", "product_id": "370", "product_identification_helper": { "model_numbers": [ "6ES7511-1FK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0)", "product_id": "371", "product_identification_helper": { "model_numbers": [ "6ES7511-1FK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0)", "product_id": "372", "product_identification_helper": { "model_numbers": [ "6ES7511-1FK02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0)", "product_id": "373", "product_identification_helper": { "model_numbers": [ "6ES7511-1TK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0)", "product_id": "374", "product_identification_helper": { "model_numbers": [ "6ES7511-1UK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0)", "product_id": "375", "product_identification_helper": { "model_numbers": [ "6ES7512-1CK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0)", "product_id": "376", "product_identification_helper": { "model_numbers": [ "6ES7512-1CK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0)", "product_id": "377", "product_identification_helper": { "model_numbers": [ "6ES7512-1SK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0)", "product_id": "378", "product_identification_helper": { "model_numbers": [ "6ES7512-1SK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK00-0AB0)", "product_id": "379", "product_identification_helper": { "model_numbers": [ "6ES7512-1DK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0)", "product_id": "380", "product_identification_helper": { "model_numbers": [ "6ES7512-1DK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL00-0AB0)", "product_id": "381", "product_identification_helper": { "model_numbers": [ "6ES7513-1AL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0)", "product_id": "382", "product_identification_helper": { "model_numbers": [ "6ES7513-1AL01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0)", "product_id": "383", "product_identification_helper": { "model_numbers": [ "6ES7513-1AL02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL00-0AB0)", "product_id": "384", "product_identification_helper": { "model_numbers": [ "6ES7513-1FL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0)", "product_id": "385", "product_identification_helper": { "model_numbers": [ "6ES7513-1FL01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0)", "product_id": "386", "product_identification_helper": { "model_numbers": [ "6ES7513-1FL02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0)", "product_id": "387", "product_identification_helper": { "model_numbers": [ "6ES7513-1RL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM00-0AB0)", "product_id": "388", "product_identification_helper": { "model_numbers": [ "6ES7515-2AM00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0)", "product_id": "389", "product_identification_helper": { "model_numbers": [ "6ES7515-2AM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0)", "product_id": "390", "product_identification_helper": { "model_numbers": [ "6ES7515-2AM02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM00-0AB0)", "product_id": "391", "product_identification_helper": { "model_numbers": [ "6ES7515-2FM00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0)", "product_id": "392", "product_identification_helper": { "model_numbers": [ "6ES7515-2FM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0)", "product_id": "393", "product_identification_helper": { "model_numbers": [ "6ES7515-2FM02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0)", "product_id": "394", "product_identification_helper": { "model_numbers": [ "6ES7515-2RM00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0)", "product_id": "395", "product_identification_helper": { "model_numbers": [ "6ES7515-2TM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0)", "product_id": "396", "product_identification_helper": { "model_numbers": [ "6ES7515-2UM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN00-0AB0)", "product_id": "397", "product_identification_helper": { "model_numbers": [ "6ES7516-3AN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0)", "product_id": "398", "product_identification_helper": { "model_numbers": [ "6ES7516-3AN01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0)", "product_id": "399", "product_identification_helper": { "model_numbers": [ "6ES7516-3AN02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN00-0AB0)", "product_id": "400", "product_identification_helper": { "model_numbers": [ "6ES7516-3FN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0)", "product_id": "401", "product_identification_helper": { "model_numbers": [ "6ES7516-3FN01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0)", "product_id": "402", "product_identification_helper": { "model_numbers": [ "6ES7516-3FN02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0)", "product_id": "403", "product_identification_helper": { "model_numbers": [ "6ES7516-3TN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0)", "product_id": "404", "product_identification_helper": { "model_numbers": [ "6ES7516-3UN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0)", "product_id": "405", "product_identification_helper": { "model_numbers": [ "6ES7517-3AP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0)", "product_id": "406", "product_identification_helper": { "model_numbers": [ "6ES7517-3FP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0)", "product_id": "407", "product_identification_helper": { "model_numbers": [ "6ES7517-3HP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0)", "product_id": "408", "product_identification_helper": { "model_numbers": [ "6ES7517-3TP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0)", "product_id": "409", "product_identification_helper": { "model_numbers": [ "6ES7517-3UP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0)", "product_id": "410", "product_identification_helper": { "model_numbers": [ "6ES7518-4AP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)", "product_id": "411", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0)", "product_id": "412", "product_identification_helper": { "model_numbers": [ "6ES7518-4FP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)", "product_id": "413", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0)", "product_id": "414", "product_identification_helper": { "model_numbers": [ "6ES7518-4JP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0)", "product_id": "415", "product_identification_helper": { "model_numbers": [ "6ES7518-4TP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0)", "product_id": "416", "product_identification_helper": { "model_numbers": [ "6ES7518-4UP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0)", "product_id": "417", "product_identification_helper": { "model_numbers": [ "6ES7518-4AP00-3AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0)", "product_id": "418", "product_identification_helper": { "model_numbers": [ "6ES7518-4FP00-3AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0)", "product_id": "419", "product_identification_helper": { "model_numbers": [ "6ES7513-2GL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0)", "product_id": "420", "product_identification_helper": { "model_numbers": [ "6ES7513-2PL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0)", "product_id": "421", "product_identification_helper": { "model_numbers": [ "6ES7516-2GN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0)", "product_id": "422", "product_identification_helper": { "model_numbers": [ "6ES7516-2PN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.9.7", "product": { "name": "SIMATIC S7-1500 Software Controller V2", "product_id": "423" } } ], "category": "product_name", "name": "SIMATIC S7-1500 Software Controller V2" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.0", "product": { "name": "SIMATIC S7-PLCSIM Advanced", "product_id": "424" } } ], "category": "product_name", "name": "SIMATIC S7-PLCSIM Advanced" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC STEP 7 (TIA Portal)", "product_id": "425" } } ], "category": "product_name", "name": "SIMATIC STEP 7 (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.7 HF4", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "426" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 Update 5", "product": { "name": "SIMATIC WinCC Unified (TIA Portal)", "product_id": "427" } } ], "category": "product_name", "name": "SIMATIC WinCC Unified (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC WinCC V7.3", "product_id": "428" } } ], "category": "product_name", "name": "SIMATIC WinCC V7.3" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V7.4 SP1 Update 22", "product": { "name": "SIMATIC WinCC V7.4", "product_id": "429" } } ], "category": "product_name", "name": "SIMATIC WinCC V7.4" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V7.5 SP2 Update 16", "product": { "name": "SIMATIC WinCC V7.5", "product_id": "430" } } ], "category": "product_name", "name": "SIMATIC WinCC V7.5" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V5.1\u003cV5.5.1", "product": { "name": "SIMOTION", "product_id": "431" } } ], "category": "product_name", "name": "SIMOTION" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT Software ST7sc", "product_id": "432" } } ], "category": "product_name", "name": "SINAUT Software ST7sc" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT ST7CC", "product_id": "433" } } ], "category": "product_name", "name": "SINAUT ST7CC" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP2", "product": { "name": "SINEC INS", "product_id": "434" } } ], "category": "product_name", "name": "SINEC INS" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP3", "product": { "name": "SINEC NMS", "product_id": "435" } } ], "category": "product_name", "name": "SINEC NMS" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.1", "product": { "name": "SINEMA Remote Connect Server", "product_id": "436" } } ], "category": "product_name", "name": "SINEMA Remote Connect Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "437", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "438", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0)", "product_id": "439", "product_identification_helper": { "model_numbers": [ "6AG1510-1SJ01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0)", "product_id": "440", "product_identification_helper": { "model_numbers": [ "6AG2510-1SJ01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0)", "product_id": "441", "product_identification_helper": { "model_numbers": [ "6AG1510-1DJ01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0)", "product_id": "442", "product_identification_helper": { "model_numbers": [ "6AG1510-1DJ01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0)", "product_id": "443", "product_identification_helper": { "model_numbers": [ "6AG2510-1DJ01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0)", "product_id": "444", "product_identification_helper": { "model_numbers": [ "6AG2510-1DJ01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK00-2AB0)", "product_id": "445", "product_identification_helper": { "model_numbers": [ "6AG1512-1SK00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0)", "product_id": "446", "product_identification_helper": { "model_numbers": [ "6AG1512-1SK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0)", "product_id": "447", "product_identification_helper": { "model_numbers": [ "6AG1512-1SK01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0)", "product_id": "448", "product_identification_helper": { "model_numbers": [ "6AG2512-1SK01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0)", "product_id": "449", "product_identification_helper": { "model_numbers": [ "6AG2512-1SK01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0)", "product_id": "450", "product_identification_helper": { "model_numbers": [ "6AG1512-1DK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0)", "product_id": "451", "product_identification_helper": { "model_numbers": [ "6AG1512-1DK01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0)", "product_id": "452", "product_identification_helper": { "model_numbers": [ "6AG2512-1DK01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0)", "product_id": "453", "product_identification_helper": { "model_numbers": [ "6AG2512-1DK01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)", "product_id": "454", "product_identification_helper": { "model_numbers": [ "6AG1343-1GX31-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)", "product_id": "455", "product_identification_helper": { "model_numbers": [ "6AG1443-1GX30-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)", "product_id": "456", "product_identification_helper": { "model_numbers": [ "6AG1242-7KX31-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.37", "product": { "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)", "product_id": "457", "product_identification_helper": { "model_numbers": [ "6AG1543-1AX00-2XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)", "product_id": "458", "product_identification_helper": { "model_numbers": [ "6AG1202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)", "product_id": "459", "product_identification_helper": { "model_numbers": [ "6AG1308-2FL10-4AA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)", "product_id": "460", "product_identification_helper": { "model_numbers": [ "6AG1206-2BB00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)", "product_id": "461", "product_identification_helper": { "model_numbers": [ "6AG1206-2BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)", "product_id": "462", "product_identification_helper": { "model_numbers": [ "6AG1208-0BA00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)", "product_id": "463", "product_identification_helper": { "model_numbers": [ "6AG1216-4BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)", "product_id": "464", "product_identification_helper": { "model_numbers": [ "6AG1243-1BX30-2AX0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)", "product_id": "465", "product_identification_helper": { "model_numbers": [ "6AG2243-1BX30-1XE0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK00-2AB0)", "product_id": "466", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0)", "product_id": "467", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0)", "product_id": "468", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0)", "product_id": "469", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0)", "product_id": "470", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK02-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0)", "product_id": "471", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0)", "product_id": "472", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK02-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0)", "product_id": "473", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0)", "product_id": "474", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK00-2AB0)", "product_id": "475", "product_identification_helper": { "model_numbers": [ "6AG1511-1FK00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0)", "product_id": "476", "product_identification_helper": { "model_numbers": [ "6AG1511-1FK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0)", "product_id": "477", "product_identification_helper": { "model_numbers": [ "6AG1511-1FK02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL00-2AB0)", "product_id": "478", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0)", "product_id": "479", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0)", "product_id": "480", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0)", "product_id": "481", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0)", "product_id": "482", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL02-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL00-2AB0)", "product_id": "483", "product_identification_helper": { "model_numbers": [ "6AG1513-1FL00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0)", "product_id": "484", "product_identification_helper": { "model_numbers": [ "6AG1513-1FL01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0)", "product_id": "485", "product_identification_helper": { "model_numbers": [ "6AG1513-1FL02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0)", "product_id": "486", "product_identification_helper": { "model_numbers": [ "6AG1515-2FM01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0)", "product_id": "487", "product_identification_helper": { "model_numbers": [ "6AG1515-2FM02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0)", "product_id": "488", "product_identification_helper": { "model_numbers": [ "6AG2515-2FM02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0)", "product_id": "489", "product_identification_helper": { "model_numbers": [ "6AG2515-2FM01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0)", "product_id": "490", "product_identification_helper": { "model_numbers": [ "6AG1515-2RM00-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0)", "product_id": "491", "product_identification_helper": { "model_numbers": [ "6AG2515-2RM00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-2AB0)", "product_id": "492", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-7AB0)", "product_id": "493", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN00-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0)", "product_id": "494", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0)", "product_id": "495", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0)", "product_id": "496", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0)", "product_id": "497", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN02-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0)", "product_id": "498", "product_identification_helper": { "model_numbers": [ "6AG2516-3AN02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0)", "product_id": "499", "product_identification_helper": { "model_numbers": [ "6AG2516-3AN01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN00-2AB0)", "product_id": "500", "product_identification_helper": { "model_numbers": [ "6AG1516-3FN00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0)", "product_id": "501", "product_identification_helper": { "model_numbers": [ "6AG1516-3FN01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0)", "product_id": "502", "product_identification_helper": { "model_numbers": [ "6AG1516-3FN02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0)", "product_id": "503", "product_identification_helper": { "model_numbers": [ "6AG2516-3FN02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0)", "product_id": "504", "product_identification_helper": { "model_numbers": [ "6AG2516-3FN02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0)", "product_id": "505", "product_identification_helper": { "model_numbers": [ "6AG1517-3HP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0)", "product_id": "506", "product_identification_helper": { "model_numbers": [ "6AG1518-4AP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)", "product_id": "507", "product_identification_helper": { "model_numbers": [ "6AG1518-4AX00-4AC0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0)", "product_id": "508", "product_identification_helper": { "model_numbers": [ "6AG1518-4FP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0)", "product_id": "509", "product_identification_helper": { "model_numbers": [ "6AG1518-4JP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4.8", "product": { "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)", "product_id": "510", "product_identification_helper": { "model_numbers": [ "6AG1543-1MX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.1.1", "product": { "name": "TeleControl Server Basic V3", "product_id": "511" } } ], "category": "product_name", "name": "TeleControl Server Basic V3" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP8", "product": { "name": "TIA Administrator", "product_id": "512" } } ], "category": "product_name", "name": "TIA Administrator" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4.8", "product": { "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)", "product_id": "513", "product_identification_helper": { "model_numbers": [ "6GK7543-1MX00-0XE0" ] } } } ], "category": "product_name", "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V15", "product_id": "514" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V15" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V16", "product_id": "515" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V16" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 Update 5", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V17", "product_id": "516" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V17" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14", "15", "16", "17", "18", "19", "20", "21", "22", "23", "24", "25", "26", "27", "28", "29", "30", "31", "32", "33", "34", "35", "36", "37", "38", "39", "40", "41", "42", "43", "93", "94", "95", "96", "97", "98", "99", "100", "101", "44", "45", "46", "47", "48", "49", "50", "51", "52", "53", "54", "55", "56", "57", "58", "59", "60", "61", "62", "63", "64", "65", "66", "67", "68", "69", "70", "71", "72", "73", "74", "75", "76", "77", "78", "79", "80", "81", "82", "83", "84", "85", "86", "87", "88", "89", "90", "91", "92", "102", "103", "104", "105", "106", "107", "108", "109", "110", "111", "112", "113", "114", "115", "116", "117", "118", "119", "120", "121", "122", "123", "124", "125", "126", "127", "128", "129", "130", "131", "132", "133", "141", "140", "139", "138", "137", "136", "135", "134", "142", "143", "151", "150", "149", "148", "147", "146", "145", "144", "152", "153", "154", "155", "156", "157", "158", "159", "160", "161", "162", "163", "164", "165", "166", "167", "168", "169", "170", "171", "172", "173", "174", "175", "176", "177", "178", "179", "180", "181", "182", "183", "184", "185", "186", "187", "188", "189", "190", "191", "192", "193", "194", "195", "196", "197", "198", "199", "200", "201", "202", "203", "204", "205", "206", "207", "208", "209", "210", "211", "212", "213", "214", "215", "216", "217", "218", "219", "220", "221", "222", "223", "224", "225", "226", "227", "228", "229", "230", "231", "232", "233", "234", "235", "236", "237", "238", "239", "240", "241", "242", "243", "244", "245", "246", "247", "273", "274", "275", "276", "269", "270", "271", "272", "277", "278", "260", "261", "262", "263", "256", "257", "258", "259", "252", "253", "254", "255", "248", "249", "250", "251", "266", "267", "264", "265", "268", "279", "280", "281", "282", "285", "286", "283", "284", "287", "288", "289", "290", "293", "294", "291", "292", "295", "296", "299", "300", "297", "298", "303", "302", "301", "304", "308", "307", "305", "306", "309", "310", "311", "315", "316", "317", "318", "319", "320", "321", "322", "323", "324", "325", "312", "313", "314", "326", "327", "328", "329", "330", "331", "332", "333", "334", "335", "336", "337", "338", "339", "340", "341", "342", "343", "344", "345", "346", "347", "348", "349", "350", "351", "352", "353", "354", "355", "356", "357", "358", "359", "360", "361", "362", "363", "364", "365", "366", "367", "368", "369", "370", "371", "372", "373", "374", "375", "376", "377", "378", "379", "380", "381", "382", "383", "384", "385", "386", "387", "388", "389", "390", "391", "392", "393", "394", "395", "396", "397", "398", "399", "400", "401", "402", "403", "404", "405", "406", "407", "408", "409", "410", "411", "412", "413", "414", "415", "416", "417", "418", "419", "420", "421", "422", "423", "424", "425", "426", "427", "428", "429", "430", "431", "432", "433", "434", "435", "436", "437", "438", "439", "440", "441", "442", "443", "444", "445", "446", "447", "448", "449", "450", "451", "452", "453", "456", "457", "454", "455", "458", "459", "460", "461", "462", "463", "464", "465", "466", "467", "468", "469", "470", "471", "472", "473", "474", "475", "476", "477", "478", "479", "480", "481", "482", "483", "484", "485", "486", "487", "488", "489", "490", "491", "492", "493", "494", "495", "496", "497", "498", "499", "500", "501", "502", "503", "504", "505", "506", "507", "508", "509", "510", "511", "512", "513", "514", "515", "516" ] }, "remediations": [ { "category": "mitigation", "details": "For the unfixed component in this version (OpenPCS 7): Restrict access to the OPC UA interface of OpenPCS 7 to trusted systems", "product_ids": [ "344" ] }, { "category": "mitigation", "details": "Restrict access to the OPC UA interface to trusted systems", "product_ids": [ "3", "4", "5" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "3", "4", "5", "44", "45", "46", "47", "48", "49", "50", "51", "52", "53", "54", "55", "56", "57", "58", "59", "60", "61", "62", "63", "64", "65", "66", "67", "68", "69", "70", "71", "72", "73", "74", "75", "76", "77", "78", "79", "80", "81", "82", "83", "84", "85", "86", "87", "88", "89", "90", "91", "92", "118", "119", "120", "121", "122", "126", "127", "128", "129", "130", "131", "132", "133", "141", "140", "139", "138", "137", "136", "135", "134", "142", "143", "151", "150", "149", "148", "147", "146", "145", "144", "152", "153", "154", "155", "156", "157", "158", "159", "160", "161", "162", "163", "164", "165", "166", "167", "168", "169", "170", "171", "172", "173", "174", "175", "176", "224", "227", "232", "233", "273", "274", "275", "276", "269", "270", "271", "272", "277", "278", "260", "261", "262", "263", "256", "257", "258", "259", "252", "253", "254", "255", "248", "249", "250", "251", "266", "267", "264", "265", "268", "309", "324", "325", "312", "314", "337", "338", "342", "343", "361", "363", "365", "370", "377", "379", "381", "384", "388", "391", "397", "400", "428", "432", "433", "445", "454", "459", "466", "475", "478", "483", "492", "493", "500", "514", "515" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "93", "94", "98", "99", "100", "101", "323", "425" ] }, { "category": "vendor_fix", "details": "Update to V1.0 SP2 or later version", "product_ids": [ "434" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812610/" }, { "category": "vendor_fix", "details": "Update to V1.0 SP3 or later version", "product_ids": [ "435" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/" }, { "category": "vendor_fix", "details": "Update to V17 SP1 Update 1 or later version", "product_ids": [ "340" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109820674/" }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "516" ] }, { "category": "vendor_fix", "details": "Update to V2.2.28 or later version", "product_ids": [ "320", "322", "437", "438" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817067/" }, { "category": "vendor_fix", "details": "Update to V2.4.8 or later version", "product_ids": [ "510", "513" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954889/" }, { "category": "vendor_fix", "details": "Update to V2.9.7 or later version", "product_ids": [ "362", "364", "366", "367", "368", "369", "371", "372", "373", "374", "375", "376", "378", "380", "382", "383", "385", "386", "387", "389", "390", "392", "393", "394", "395", "396", "398", "399", "401", "402", "417", "418", "419", "420", "421", "422", "439", "440", "441", "442", "443", "444", "446", "447", "448", "449", "450", "451", "452", "453", "467", "468", "469", "470", "471", "472", "473", "474", "476", "477", "479", "480", "481", "482", "484", "485", "486", "487", "488", "489", "490", "491", "494", "495", "496", "497", "498", "499", "501", "502", "503", "504" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/" }, { "category": "vendor_fix", "details": "Update to V2.9.7 or later version", "product_ids": [ "326", "327" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109773914/" }, { "category": "vendor_fix", "details": "Update to V21.9.7 or later version", "product_ids": [ "328" ] }, { "category": "vendor_fix", "details": "Update to V21.9.7 or later version", "product_ids": [ "423" ] }, { "category": "vendor_fix", "details": "Update to V3.0.1 or later version", "product_ids": [ "403", "404", "405", "406", "407", "408", "409", "410", "411", "412", "413", "414", "415", "416", "505", "506", "507", "508", "509" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/" }, { "category": "vendor_fix", "details": "Update to V3.0.37 or later version", "product_ids": [ "321", "457" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109828349/" }, { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "436" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811169/" }, { "category": "vendor_fix", "details": "Update to V3.1.1 or later version", "product_ids": [ "511" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812231/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "331" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811878/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "313", "455" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/" }, { "category": "vendor_fix", "details": "Update to V3.4.29 or later version", "product_ids": [ "315", "316", "317", "318", "319", "456", "464", "465" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109823721/" }, { "category": "vendor_fix", "details": "Update to V4.0 or later version", "product_ids": [ "345" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814551/" }, { "category": "vendor_fix", "details": "Update to V4.4 or later version", "product_ids": [ "177", "178", "179", "180", "181", "182", "183", "184", "185", "186", "187", "188", "189", "190", "191", "192", "193", "194", "195", "196", "197", "198", "199", "200", "201", "202", "203", "204", "205", "206", "207", "208", "209", "210", "211", "212", "213", "214", "215", "216", "217", "218", "219", "220", "221", "225", "226", "228", "229", "240", "241", "242", "243", "244", "245", "246", "247", "279", "280", "281", "282", "285", "286", "283", "284", "287", "288", "460", "461", "462", "463" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817768/" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version", "product_ids": [ "424" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809300/" }, { "category": "vendor_fix", "details": "Update to V5.5.1 or later version", "product_ids": [ "431" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812773/" }, { "category": "vendor_fix", "details": "Update to V5.5.2 or later version", "product_ids": [ "111", "112", "113", "114", "115", "116", "117", "123", "124", "125", "222", "223", "230", "231", "458" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817790/" }, { "category": "vendor_fix", "details": "Update to V7.2 or later version", "product_ids": [ "7", "8", "21", "22", "23", "24", "25", "26", "27", "28", "29", "30", "31", "32", "33", "34", "35", "36", "37", "38" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817007/" }, { "category": "vendor_fix", "details": "Update to V7.4 SP1 Update 22 or later version", "product_ids": [ "429" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826450/" }, { "category": "vendor_fix", "details": "Update to V7.5 SP2 Update 16 or later version", "product_ids": [ "430" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109793460/" }, { "category": "vendor_fix", "details": "Update to V9.1 Update 1 or later version", "product_ids": [ "341" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826159/" }, { "category": "vendor_fix", "details": "Update to V9.1 SP2 UC04 or later version", "product_ids": [ "344" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812242/" }, { "category": "vendor_fix", "details": "Update to V9.2 SP2 or later version", "product_ids": [ "346" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811911/" }, { "category": "vendor_fix", "details": "Update to V18 or later version", "product_ids": [ "329" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109746530/" }, { "category": "vendor_fix", "details": "Update to V4.6.0 or later version", "product_ids": [ "360" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814248/" }, { "category": "vendor_fix", "details": "Update to V4.0.1 or later version", "product_ids": [ "355", "356", "357", "358", "359" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811014/" }, { "category": "vendor_fix", "details": "Update to V5.7 HF4 or later version", "product_ids": [ "426" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811212/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "348", "349", "350", "351", "352", "353" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811120/" }, { "category": "vendor_fix", "details": "Update to V2.15.1 or later version", "product_ids": [ "9", "10", "11", "12", "13", "14", "15", "16", "17", "18", "19" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Update to V1.6 Upd6 or later version", "product_ids": [ "330" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109805072/" }, { "category": "vendor_fix", "details": "Update to V1.0 SP8 or later version", "product_ids": [ "512" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/114358/" }, { "category": "vendor_fix", "details": "Update to V16 Update 6 or later version", "product_ids": [ "339" ] }, { "category": "vendor_fix", "details": "Update to V2020 SP1 Update 1 or later version\nIn the context of SIMATIC PCS neo, update to SIMATIC PCS neo V4.0 or later version (\u003chttps://support.industry.siemens.com/cs/ww/de/view/109814551/\u003e); in the context of SIMATIC PCS 7, update to SIMATIC PCS 7 V9.1 SP2 or later version (\u003chttps://support.industry.siemens.com/cs/ww/en/view/109812240/\u003e); in the context of SIMATIC WinCC, contact local support", "product_ids": [ "347" ] }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "20" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "354" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811118/" }, { "category": "vendor_fix", "details": "Update to V2.3.1 or later version", "product_ids": [ "39", "40", "41", "42", "43" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810992/" }, { "category": "vendor_fix", "details": "Update to V1.9 or later version", "product_ids": [ "310", "311" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812235/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "332", "333", "334", "335", "336" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811878/" }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "102", "103", "104", "105", "106", "107", "108", "109", "110" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/" }, { "category": "vendor_fix", "details": "Update ROX II to V2.15.1 or later version", "product_ids": [ "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Update to V6.5 or later version", "product_ids": [ "234", "235", "236", "237", "238", "239", "289", "290", "293", "294", "291", "292", "295", "296", "299", "300", "297", "298", "303", "302", "301", "304", "308", "307", "305", "306" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809635/" }, { "category": "vendor_fix", "details": "Use the Edge Management System to update to V1.7 or later version", "product_ids": [ "1", "2" ], "url": "https://www.siemens.com/industrial-edge-marketplace/" }, { "category": "vendor_fix", "details": "Update to V8.7.1.11 or later version", "product_ids": [ "95", "96", "97" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109816886/" }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "427" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109792171/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14", "15", "16", "17", "18", "19", "20", "21", "22", "23", "24", "25", "26", "27", "28", "29", "30", "31", "32", "33", "34", "35", "36", "37", "38", "39", "40", "41", "42", "43", "93", "94", "95", "96", "97", "98", "99", "100", "101", "44", "45", "46", "47", "48", "49", "50", "51", "52", "53", "54", "55", "56", "57", "58", "59", "60", "61", "62", "63", "64", "65", "66", "67", "68", "69", "70", "71", "72", "73", "74", "75", "76", "77", "78", "79", "80", "81", "82", "83", "84", "85", "86", "87", "88", "89", "90", "91", "92", "102", "103", "104", "105", "106", "107", "108", "109", "110", "111", "112", "113", "114", "115", "116", "117", "118", "119", "120", "121", "122", "123", "124", "125", "126", "127", "128", "129", "130", "131", "132", "133", "141", "140", "139", "138", "137", "136", "135", "134", "142", "143", "151", "150", "149", "148", "147", "146", "145", "144", "152", "153", "154", "155", "156", "157", "158", "159", "160", "161", "162", "163", "164", "165", "166", "167", "168", "169", "170", "171", "172", "173", "174", "175", "176", "177", "178", "179", "180", "181", "182", "183", "184", "185", "186", "187", "188", "189", "190", "191", "192", "193", "194", "195", "196", "197", "198", "199", "200", "201", "202", "203", "204", "205", "206", "207", "208", "209", "210", "211", "212", "213", "214", "215", "216", "217", "218", "219", "220", "221", "222", "223", "224", "225", "226", "227", "228", "229", "230", "231", "232", "233", "234", "235", "236", "237", "238", "239", "240", "241", "242", "243", "244", "245", "246", "247", "273", "274", "275", "276", "269", "270", "271", "272", "277", "278", "260", "261", "262", "263", "256", "257", "258", "259", "252", "253", "254", "255", "248", "249", "250", "251", "266", "267", "264", "265", "268", "279", "280", "281", "282", "285", "286", "283", "284", "287", "288", "289", "290", "293", "294", "291", "292", "295", "296", "299", "300", "297", "298", "303", "302", "301", "304", "308", "307", "305", "306", "309", "310", "311", "315", "316", "317", "318", "319", "320", "321", "322", "323", "324", "325", "312", "313", "314", "326", "327", "328", "329", "330", "331", "332", "333", "334", "335", "336", "337", "338", "339", "340", "341", "342", "343", "344", "345", "346", "347", "348", "349", "350", "351", "352", "353", "354", "355", "356", "357", "358", "359", "360", "361", "362", "363", "364", "365", "366", "367", "368", "369", "370", "371", "372", "373", "374", "375", "376", "377", "378", "379", "380", "381", "382", "383", "384", "385", "386", "387", "388", "389", "390", "391", "392", "393", "394", "395", "396", "397", "398", "399", "400", "401", "402", "403", "404", "405", "406", "407", "408", "409", "410", "411", "412", "413", "414", "415", "416", "417", "418", "419", "420", "421", "422", "423", "424", "425", "426", "427", "428", "429", "430", "431", "432", "433", "434", "435", "436", "437", "438", "439", "440", "441", "442", "443", "444", "445", "446", "447", "448", "449", "450", "451", "452", "453", "456", "457", "454", "455", "458", "459", "460", "461", "462", "463", "464", "465", "466", "467", "468", "469", "470", "471", "472", "473", "474", "475", "476", "477", "478", "479", "480", "481", "482", "483", "484", "485", "486", "487", "488", "489", "490", "491", "492", "493", "494", "495", "496", "497", "498", "499", "500", "501", "502", "503", "504", "505", "506", "507", "508", "509", "510", "511", "512", "513", "514", "515", "516" ] } ], "title": "CVE-2022-0778" } ] }
ssa-712929
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A vulnerability in the openSSL component (CVE-2022-0778, [0]) could allow an attacker to create a denial of service condition by providing specially crafted elliptic curve certificates to products that use a vulnerable version of openSSL.\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.\n\n[0] \nhttps://www.openssl.org/news/secadv/20220315.txt", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-712929.html" }, { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-712929.json" }, { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "category": "self", "summary": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-712929.txt" } ], "title": "SSA-712929: Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products", "tracking": { "current_release_date": "2024-05-14T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-712929", "initial_release_date": "2022-06-14T00:00:00Z", "revision_history": [ { "date": "2022-06-14T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2022-07-12T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added SCALANCE X-200, X-200 IRT, X-300, XM-400, XR-500, XR-300WG, XB-200, XC-200, XF-200, XP-200 product families and Security Configuration Tool (SCT) as affected; added fix for RUGGEDCOM ROX devices and SIMATIC MV500 devices; no fix planned for SIMATIC NET PC Software, SIMATIC CP 343-1 Advanced and SIMATIC CP 443-1 Advanced (incl. SIPLUS NET variants)" }, { "date": "2022-08-09T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix for Industrial Edge - OPC UA Connector, SIMATIC Cloud Connect 7 gateways, SIMATIC Logon, SIMATIC PDM, SIMATIC STEP 7 V5.X and TeleControl Server Basic; added SCALANCE W1750D as affected; clarified that Industrial Edge - PROFINET IO Connector is not affected" }, { "date": "2022-09-13T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added fix for RUGGEDCOM CROSSBOW Station Access Controller (SAC), SCALANCE XM-400 and XR-500 product families, and SINEC INS" }, { "date": "2022-10-11T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added fix for SIMATIC WinCC Unified, TIA Portal V17, and SINEC NMS; added SCALANCE W-700 and W-1700 product families as affected; corrected several product names in the SCALANCE XB and XP product families" }, { "date": "2022-12-13T00:00:00Z", "legacy_version": "1.5", "number": "6", "summary": "Added SIMATIC Process Historian and SIMATIC HMI Unified Comfort Panels; added fix for SIMATIC PCS neo, SIMATIC Drive Controller family, SIMATIC S7-PLCSIM Advanced, SIMATIC S7-1500 and S7-1200 CPU families, and TIA Administrator; no fix planned for TIA Portal V16" }, { "date": "2023-01-10T00:00:00Z", "legacy_version": "1.6", "number": "7", "summary": "Added fix for SCALANCE W-700 IEEE 802.11ax product family" }, { "date": "2023-02-14T00:00:00Z", "legacy_version": "1.7", "number": "8", "summary": "Added fix for SCALANCE W1750D product family" }, { "date": "2023-03-14T00:00:00Z", "legacy_version": "1.8", "number": "9", "summary": "Added fix for SIMATIC CP 1542SP-1 and SIMATIC CP 1543SP-1, RUGGEDCOM RM1224 family, SCALANCE M-800 family, SCALANCE MUM-800 family, SCALANCE S615. Added missing affected products SCALANCE M876-4 (6GK5876-4AA10-2BA2) and SCALANCE S615 EEC (6GK5615-0AA01- 2AA2)" }, { "date": "2023-04-11T00:00:00Z", "legacy_version": "1.9", "number": "10", "summary": "Added fix for SCALANCE X-200IRT family, SIMATIC CP 443-1 Advanced, TIM 1531 IRC, SCALANCE XB-200, XC-200, XP-200, XF-200BA, XR-300WG family, and for SIMATIC WinCC" }, { "date": "2023-05-09T00:00:00Z", "legacy_version": "2.0", "number": "11", "summary": "Added fix for SIMATIC S7-1500 Software Controller; fix planned for SIMATIC NET PC Software V17" }, { "date": "2023-06-13T00:00:00Z", "legacy_version": "2.1", "number": "12", "summary": "Added fix for SIMOTION; clarified that no fix is planned for V8.2, V9.0, V9.1 of OpenPCS 7 and for V8.2, V9.0 of SIMATIC PCS 7; added fix and mitigation information for SIMATIC PCS 7 V9.1" }, { "date": "2023-07-11T00:00:00Z", "legacy_version": "2.2", "number": "13", "summary": "Expanded SIMATIC S7-1500 CPU family to individual products/MLFBs and added additional fix for V2 firmware version line; Fix for SIMATIC Drive Controller available already with V2.9.7" }, { "date": "2023-09-12T00:00:00Z", "legacy_version": "2.3", "number": "14", "summary": "Clarified SIMATIC S7-1500 Software Controller versions and adjusted fix for SIMATIC S7-1500 Software Controller V2; Clarified SIMATIC ET 200SP Open Controller versions and added fix for SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)" }, { "date": "2023-10-10T00:00:00Z", "legacy_version": "2.4", "number": "15", "summary": "Added fix for SIMATIC CP 1242-7 V2 family, SIMATIC CP 1243-1 family, SIMATIC CP 1243-7 LTE family, SIMATIC CP 1243-8 IRC and for SIMATIC NET PC Software V17" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "2.5", "number": "16", "summary": "Added fix for SIMATIC PCS 7 TeleControl; Clarified that no fix is planned for SINAUT Software ST7sc and SINAUT ST7CC" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "2.6", "number": "17", "summary": "Added fix for SIMATIC CP 1543-1 (incl. SIPLUS variants); Updated fix for TIM 1531 IRC (incl. SIPLUS NET variants)" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "2.7", "number": "18", "summary": "Expanded SIMATIC WinCC family to individual version lines; SIMATIC PCS 7 V9.1: clarified that V9.1 SP2 UC04 fixes the issue in SIMATIC WinCC" } ], "status": "interim", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.7", "product": { "name": "Industrial Edge - OPC UA Connector", "product_id": "1" } } ], "category": "product_name", "name": "Industrial Edge - OPC UA Connector" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV1.7", "product": { "name": "Industrial Edge - SIMATIC S7 Connector App", "product_id": "2" } } ], "category": "product_name", "name": "Industrial Edge - SIMATIC S7 Connector App" }, { "branches": [ { "category": "product_version_range", "name": "All versions (OPC UA interface only)", "product": { "name": "OpenPCS 7 V8.2", "product_id": "3" } } ], "category": "product_name", "name": "OpenPCS 7 V8.2" }, { "branches": [ { "category": "product_version_range", "name": "All versions (OPC UA interface only)", "product": { "name": "OpenPCS 7 V9.0", "product_id": "4" } } ], "category": "product_name", "name": "OpenPCS 7 V9.0" }, { "branches": [ { "category": "product_version_range", "name": "All versions (OPC UA interface only)", "product": { "name": "OpenPCS 7 V9.1", "product_id": "5" } } ], "category": "product_name", "name": "OpenPCS 7 V9.1" }, { "branches": [ { "category": "product_version_range", "name": "All versions only when running on ROX II \u003c V2.15.1", "product": { "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)", "product_id": "6" } } ], "category": "product_name", "name": "RUGGEDCOM CROSSBOW Station Access Controller (SAC)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)", "product_id": "7", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2BA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)", "product_id": "8", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2DA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000", "product_id": "9" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX MX5000RE", "product_id": "10" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000RE" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1400", "product_id": "11" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1400" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1500", "product_id": "12" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1500" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1501", "product_id": "13" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1501" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1510", "product_id": "14" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1510" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1511", "product_id": "15" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1511" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1512", "product_id": "16" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1512" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1524", "product_id": "17" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1524" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX1536", "product_id": "18" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1536" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.15.1", "product": { "name": "RUGGEDCOM ROX RX5000", "product_id": "19" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX5000" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)", "product_id": "20", "product_identification_helper": { "model_numbers": [ "6GK5998-3GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)", "product_id": "21", "product_identification_helper": { "model_numbers": [ "6GK5804-0AP00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)", "product_id": "22", "product_identification_helper": { "model_numbers": [ "6GK5812-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)", "product_id": "23", "product_identification_helper": { "model_numbers": [ "6GK5812-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)", "product_id": "24", "product_identification_helper": { "model_numbers": [ "6GK5816-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)", "product_id": "25", "product_identification_helper": { "model_numbers": [ "6GK5816-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)", "product_id": "26", "product_identification_helper": { "model_numbers": [ "6GK5826-2AB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)", "product_id": "27", "product_identification_helper": { "model_numbers": [ "6GK5874-2AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)", "product_id": "28", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)", "product_id": "29", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)", "product_id": "30", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2EA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)", "product_id": "31", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA10-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)", "product_id": "32", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)", "product_id": "33", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2DA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)", "product_id": "34", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA00-2DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)", "product_id": "35", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)", "product_id": "36", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)", "product_id": "37", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV7.2", "product": { "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)", "product_id": "38", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA01-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)", "product_id": "39", "product_identification_helper": { "model_numbers": [ "6GK5622-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)", "product_id": "40", "product_identification_helper": { "model_numbers": [ "6GK5632-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)", "product_id": "41", "product_identification_helper": { "model_numbers": [ "6GK5636-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)", "product_id": "42", "product_identification_helper": { "model_numbers": [ "6GK5642-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3.1", "product": { "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)", "product_id": "43", "product_identification_helper": { "model_numbers": [ "6GK5646-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)", "product_id": "44", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)", "product_id": "45", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)", "product_id": "46", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)", "product_id": "47", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)", "product_id": "48", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)", "product_id": "49", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)", "product_id": "50", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)", "product_id": "51", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)", "product_id": "52", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)", "product_id": "53", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)", "product_id": "54", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)", "product_id": "55", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)", "product_id": "56", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)", "product_id": "57", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)", "product_id": "58", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)", "product_id": "59", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)", "product_id": "60", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)", "product_id": "61", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)", "product_id": "62", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)", "product_id": "63", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)", "product_id": "64", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)", "product_id": "65", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)", "product_id": "66", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)", "product_id": "67", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)", "product_id": "68", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)", "product_id": "69", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)", "product_id": "70", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)", "product_id": "71", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)", "product_id": "72", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)", "product_id": "73", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)", "product_id": "74", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)", "product_id": "75", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)", "product_id": "76", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)", "product_id": "77", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)", "product_id": "78", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)", "product_id": "79", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)", "product_id": "80", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)", "product_id": "81", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)", "product_id": "82", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)", "product_id": "83", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)", "product_id": "84", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)", "product_id": "85", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)", "product_id": "86", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)", "product_id": "87", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)", "product_id": "88", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)", "product_id": "89", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)", "product_id": "90", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)", "product_id": "91", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)", "product_id": "92", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)", "product_id": "93", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)", "product_id": "94", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)", "product_id": "95", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AD0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)", "product_id": "96", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.7.1.11", "product": { "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)", "product_id": "97", "product_identification_helper": { "model_numbers": [ "6GK5750-2HX01-1AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)", "product_id": "98", "product_identification_helper": { "model_numbers": [ "6GK5788-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)", "product_id": "99", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)", "product_id": "100", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)", "product_id": "101", "product_identification_helper": { "model_numbers": [ "6GK5788-2HY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)", "product_id": "102", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)", "product_id": "103", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)", "product_id": "104", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)", "product_id": "105", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)", "product_id": "106", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)", "product_id": "107", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)", "product_id": "108", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)", "product_id": "109", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0", "product": { "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)", "product_id": "110", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)", "product_id": "111", "product_identification_helper": { "model_numbers": [ "6GK5200-4AH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)", "product_id": "112", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)", "product_id": "113", "product_identification_helper": { "model_numbers": [ "6GK5201-3JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)", "product_id": "114", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)", "product_id": "115", "product_identification_helper": { "model_numbers": [ "6GK5202-2BB10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2IRT (6GK5202-2BB10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)", "product_id": "116", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)", "product_id": "117", "product_identification_helper": { "model_numbers": [ "6GK5202-2JR00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)", "product_id": "118", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2 (6GK5204-2BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)", "product_id": "119", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB11-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)", "product_id": "120", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)", "product_id": "121", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)", "product_id": "122", "product_identification_helper": { "model_numbers": [ "6GK5204-2BB10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)", "product_id": "123", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)", "product_id": "124", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA10-2BA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT (6GK5204-0BA10-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)", "product_id": "125", "product_identification_helper": { "model_numbers": [ "6GK5204-0JA00-2BA6" ] } } } ], "category": "product_name", "name": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)", "product_id": "126", "product_identification_helper": { "model_numbers": [ "6GK5206-1BB10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1 (6GK5206-1BB10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)", "product_id": "127", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)", "product_id": "128", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X208 (6GK5208-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)", "product_id": "129", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA10-2AA6" ] } } } ], "category": "product_name", "name": "SCALANCE X208PRO (6GK5208-0HA10-2AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)", "product_id": "130", "product_identification_helper": { "model_numbers": [ "6GK5212-2BB00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2 (6GK5212-2BB00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)", "product_id": "131", "product_identification_helper": { "model_numbers": [ "6GK5212-2BC00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)", "product_id": "132", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X216 (6GK5216-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)", "product_id": "133", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X224 (6GK5224-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)", "product_id": "134", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)", "product_id": "135", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)", "product_id": "136", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)", "product_id": "137", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)", "product_id": "138", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)", "product_id": "139", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)", "product_id": "140", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)", "product_id": "141", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)", "product_id": "142", "product_identification_helper": { "model_numbers": [ "6GK5304-2BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)", "product_id": "143", "product_identification_helper": { "model_numbers": [ "6GK5306-1BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)", "product_id": "144", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)", "product_id": "145", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)", "product_id": "146", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)", "product_id": "147", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)", "product_id": "148", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)", "product_id": "149", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)", "product_id": "150", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)", "product_id": "151", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)", "product_id": "152", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)", "product_id": "153", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)", "product_id": "154", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)", "product_id": "155", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)", "product_id": "156", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)", "product_id": "157", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)", "product_id": "158", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)", "product_id": "159", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)", "product_id": "160", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)", "product_id": "161", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)", "product_id": "162", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)", "product_id": "163", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)", "product_id": "164", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)", "product_id": "165", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)", "product_id": "166", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)", "product_id": "167", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)", "product_id": "168", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)", "product_id": "169", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)", "product_id": "170", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)", "product_id": "171", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)", "product_id": "172", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)", "product_id": "173", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)", "product_id": "174", "product_identification_helper": { "model_numbers": [ "6GK5320-1BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)", "product_id": "175", "product_identification_helper": { "model_numbers": [ "6GK5320-3BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)", "product_id": "176", "product_identification_helper": { "model_numbers": [ "6GK5408-2FD00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)", "product_id": "177", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)", "product_id": "178", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)", "product_id": "179", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)", "product_id": "180", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)", "product_id": "181", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)", "product_id": "182", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)", "product_id": "183", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)", "product_id": "184", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)", "product_id": "185", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)", "product_id": "186", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)", "product_id": "187", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)", "product_id": "188", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)", "product_id": "189", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)", "product_id": "190", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)", "product_id": "191", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)", "product_id": "192", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)", "product_id": "193", "product_identification_helper": { "model_numbers": [ "6GK5206-2BD00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)", "product_id": "194", "product_identification_helper": { "model_numbers": [ "6GK5206-2BB00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)", "product_id": "195", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)", "product_id": "196", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)", "product_id": "197", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)", "product_id": "198", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)", "product_id": "199", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)", "product_id": "200", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)", "product_id": "201", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)", "product_id": "202", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)", "product_id": "203", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)", "product_id": "204", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)", "product_id": "205", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)", "product_id": "206", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)", "product_id": "207", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)", "product_id": "208", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)", "product_id": "209", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)", "product_id": "210", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)", "product_id": "211", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)", "product_id": "212", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)", "product_id": "213", "product_identification_helper": { "model_numbers": [ "6GK5216-4BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)", "product_id": "214", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)", "product_id": "215", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)", "product_id": "216", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)", "product_id": "217", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)", "product_id": "218", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)", "product_id": "219", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)", "product_id": "220", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)", "product_id": "221", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)", "product_id": "222", "product_identification_helper": { "model_numbers": [ "6GK5201-3BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)", "product_id": "223", "product_identification_helper": { "model_numbers": [ "6GK5202-2BH00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)", "product_id": "224", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)", "product_id": "225", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)", "product_id": "226", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)", "product_id": "227", "product_identification_helper": { "model_numbers": [ "6GK5204-2BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)", "product_id": "228", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)", "product_id": "229", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)", "product_id": "230", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2BD2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)", "product_id": "231", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2BF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)", "product_id": "232", "product_identification_helper": { "model_numbers": [ "6GK5206-1BC00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)", "product_id": "233", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF208 (6GK5208-0BA00-2AF2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)", "product_id": "234", "product_identification_helper": { "model_numbers": [ "6GK5408-4GP00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)", "product_id": "235", "product_identification_helper": { "model_numbers": [ "6GK5408-4GQ00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)", "product_id": "236", "product_identification_helper": { "model_numbers": [ "6GK5408-8GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)", "product_id": "237", "product_identification_helper": { "model_numbers": [ "6GK5408-8GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)", "product_id": "238", "product_identification_helper": { "model_numbers": [ "6GK5416-4GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)", "product_id": "239", "product_identification_helper": { "model_numbers": [ "6GK5416-4GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)", "product_id": "240", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)", "product_id": "241", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)", "product_id": "242", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)", "product_id": "243", "product_identification_helper": { "model_numbers": [ "6GK5208-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)", "product_id": "244", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)", "product_id": "245", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)", "product_id": "246", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)", "product_id": "247", "product_identification_helper": { "model_numbers": [ "6GK5216-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)", "product_id": "248", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)", "product_id": "249", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)", "product_id": "250", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)", "product_id": "251", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)", "product_id": "252", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)", "product_id": "253", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)", "product_id": "254", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)", "product_id": "255", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)", "product_id": "256", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)", "product_id": "257", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)", "product_id": "258", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)", "product_id": "259", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)", "product_id": "260", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)", "product_id": "261", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)", "product_id": "262", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)", "product_id": "263", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)", "product_id": "264", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)", "product_id": "265", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)", "product_id": "266", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)", "product_id": "267", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)", "product_id": "268", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)", "product_id": "269", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)", "product_id": "270", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)", "product_id": "271", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)", "product_id": "272", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)", "product_id": "273", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)", "product_id": "274", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)", "product_id": "275", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)", "product_id": "276", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)", "product_id": "277", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)", "product_id": "278", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)", "product_id": "279", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)", "product_id": "280", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)", "product_id": "281", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)", "product_id": "282", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)", "product_id": "283", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)", "product_id": "284", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)", "product_id": "285", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)", "product_id": "286", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)", "product_id": "287", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)", "product_id": "288", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)", "product_id": "289", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)", "product_id": "290", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)", "product_id": "291", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)", "product_id": "292", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)", "product_id": "293", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)", "product_id": "294", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)", "product_id": "295", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)", "product_id": "296", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)", "product_id": "297", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)", "product_id": "298", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)", "product_id": "299", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)", "product_id": "300", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)", "product_id": "301", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)", "product_id": "302", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)", "product_id": "303", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)", "product_id": "304", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)", "product_id": "305", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)", "product_id": "306", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)", "product_id": "307", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV6.5", "product": { "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)", "product_id": "308", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Security Configuration Tool (SCT)", "product_id": "309" } } ], "category": "product_name", "name": "Security Configuration Tool (SCT)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)", "product_id": "310", "product_identification_helper": { "model_numbers": [ "6GK1411-1AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV1.9", "product": { "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)", "product_id": "311", "product_identification_helper": { "model_numbers": [ "6GK1411-5AC00" ] } } } ], "category": "product_name", "name": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)", "product_id": "312", "product_identification_helper": { "model_numbers": [ "6GK7343-1GX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)", "product_id": "313", "product_identification_helper": { "model_numbers": [ "6GK7443-1GX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "314", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)", "product_id": "315", "product_identification_helper": { "model_numbers": [ "6GK7242-7KX31-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)", "product_id": "316", "product_identification_helper": { "model_numbers": [ "6GK7243-1BX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)", "product_id": "317", "product_identification_helper": { "model_numbers": [ "6GK7243-7KX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)", "product_id": "318", "product_identification_helper": { "model_numbers": [ "6GK7243-7SX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)", "product_id": "319", "product_identification_helper": { "model_numbers": [ "6GK7243-8RX30-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "320", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.37", "product": { "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)", "product_id": "321", "product_identification_helper": { "model_numbers": [ "6GK7543-1AX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "322", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)", "product_id": "323", "product_identification_helper": { "model_numbers": [ "6GK7545-1GX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1626 (6GK1162-6AA01)", "product_id": "324", "product_identification_helper": { "model_numbers": [ "6GK1162-6AA01" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1626 (6GK1162-6AA01)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 1628 (6GK1162-8AA00)", "product_id": "325", "product_identification_helper": { "model_numbers": [ "6GK1162-8AA00" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1628 (6GK1162-8AA00)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)", "product_id": "326", "product_identification_helper": { "model_numbers": [ "6ES7615-4DF10-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0)", "product_id": "327", "product_identification_helper": { "model_numbers": [ "6ES7615-7DF10-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.9.7", "product": { "name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)", "product_id": "328" } } ], "category": "product_name", "name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV18", "product": { "name": "SIMATIC HMI Unified Comfort Panels", "product_id": "329" } } ], "category": "product_name", "name": "SIMATIC HMI Unified Comfort Panels" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.6 Upd6", "product": { "name": "SIMATIC Logon V1.6", "product_id": "330" } } ], "category": "product_name", "name": "SIMATIC Logon V1.6" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV540 H (6GF3540-0GE10)", "product_id": "331", "product_identification_helper": { "model_numbers": [ "6GF3540-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 H (6GF3540-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV540 S (6GF3540-0CD10)", "product_id": "332", "product_identification_helper": { "model_numbers": [ "6GF3540-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV540 S (6GF3540-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV550 H (6GF3550-0GE10)", "product_id": "333", "product_identification_helper": { "model_numbers": [ "6GF3550-0GE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 H (6GF3550-0GE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV550 S (6GF3550-0CD10)", "product_id": "334", "product_identification_helper": { "model_numbers": [ "6GF3550-0CD10" ] } } } ], "category": "product_name", "name": "SIMATIC MV550 S (6GF3550-0CD10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV560 U (6GF3560-0LE10)", "product_id": "335", "product_identification_helper": { "model_numbers": [ "6GF3560-0LE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 U (6GF3560-0LE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIMATIC MV560 X (6GF3560-0HE10)", "product_id": "336", "product_identification_helper": { "model_numbers": [ "6GF3560-0HE10" ] } } } ], "category": "product_name", "name": "SIMATIC MV560 X (6GF3560-0HE10)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V14", "product_id": "337" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V14" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC NET PC Software V15", "product_id": "338" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V15" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V16 Update 6", "product": { "name": "SIMATIC NET PC Software V16", "product_id": "339" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V16" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 SP1 Update 1", "product": { "name": "SIMATIC NET PC Software V17", "product_id": "340" } } ], "category": "product_name", "name": "SIMATIC NET PC Software V17" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.1 Update 1", "product": { "name": "SIMATIC PCS 7 TeleControl", "product_id": "341" } } ], "category": "product_name", "name": "SIMATIC PCS 7 TeleControl" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC PCS 7 V8.2", "product_id": "342" } } ], "category": "product_name", "name": "SIMATIC PCS 7 V8.2" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC PCS 7 V9.0", "product_id": "343" } } ], "category": "product_name", "name": "SIMATIC PCS 7 V9.0" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.1 SP2 UC04", "product": { "name": "SIMATIC PCS 7 V9.1", "product_id": "344" } } ], "category": "product_name", "name": "SIMATIC PCS 7 V9.1" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0", "product": { "name": "SIMATIC PCS neo (Administration Console)", "product_id": "345" } } ], "category": "product_name", "name": "SIMATIC PCS neo (Administration Console)" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.2 SP2", "product": { "name": "SIMATIC PDM", "product_id": "346" } } ], "category": "product_name", "name": "SIMATIC PDM" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V2020 SP1 Update 1", "product": { "name": "SIMATIC Process Historian OPC UA Server", "product_id": "347" } } ], "category": "product_name", "name": "SIMATIC Process Historian OPC UA Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF166C (6GT2002-0EE20)", "product_id": "348", "product_identification_helper": { "model_numbers": [ "6GT2002-0EE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF166C (6GT2002-0EE20)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF185C (6GT2002-0JE10)", "product_id": "349", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE10" ] } } } ], "category": "product_name", "name": "SIMATIC RF185C (6GT2002-0JE10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF186C (6GT2002-0JE20)", "product_id": "350", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE20" ] } } } ], "category": "product_name", "name": "SIMATIC RF186C (6GT2002-0JE20)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF186CI (6GT2002-0JE50)", "product_id": "351", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE50" ] } } } ], "category": "product_name", "name": "SIMATIC RF186CI (6GT2002-0JE50)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF188C (6GT2002-0JE40)", "product_id": "352", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE40" ] } } } ], "category": "product_name", "name": "SIMATIC RF188C (6GT2002-0JE40)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF188CI (6GT2002-0JE60)", "product_id": "353", "product_identification_helper": { "model_numbers": [ "6GT2002-0JE60" ] } } } ], "category": "product_name", "name": "SIMATIC RF188CI (6GT2002-0JE60)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.0.1", "product": { "name": "SIMATIC RF360R (6GT2801-5BA30)", "product_id": "354", "product_identification_helper": { "model_numbers": [ "6GT2801-5BA30" ] } } } ], "category": "product_name", "name": "SIMATIC RF360R (6GT2801-5BA30)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF610R (6GT2811-6BC10)", "product_id": "355", "product_identification_helper": { "model_numbers": [ "6GT2811-6BC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF610R (6GT2811-6BC10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF615R (6GT2811-6CC10)", "product_id": "356", "product_identification_helper": { "model_numbers": [ "6GT2811-6CC10" ] } } } ], "category": "product_name", "name": "SIMATIC RF615R (6GT2811-6CC10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF650R (6GT2811-6AB20)", "product_id": "357", "product_identification_helper": { "model_numbers": [ "6GT2811-6AB20" ] } } } ], "category": "product_name", "name": "SIMATIC RF650R (6GT2811-6AB20)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF680R (6GT2811-6AA10)", "product_id": "358", "product_identification_helper": { "model_numbers": [ "6GT2811-6AA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF680R (6GT2811-6AA10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.0.1", "product": { "name": "SIMATIC RF685R (6GT2811-6CA10)", "product_id": "359", "product_identification_helper": { "model_numbers": [ "6GT2811-6CA10" ] } } } ], "category": "product_name", "name": "SIMATIC RF685R (6GT2811-6CA10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.6.0", "product": { "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "product_id": "360" } } ], "category": "product_name", "name": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0)", "product_id": "361", "product_identification_helper": { "model_numbers": [ "6ES7510-1SJ00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0)", "product_id": "362", "product_identification_helper": { "model_numbers": [ "6ES7510-1SJ01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0)", "product_id": "363", "product_identification_helper": { "model_numbers": [ "6ES7510-1DJ00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0)", "product_id": "364", "product_identification_helper": { "model_numbers": [ "6ES7510-1DJ01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK00-0AB0)", "product_id": "365", "product_identification_helper": { "model_numbers": [ "6ES7511-1AK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0)", "product_id": "366", "product_identification_helper": { "model_numbers": [ "6ES7511-1AK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0)", "product_id": "367", "product_identification_helper": { "model_numbers": [ "6ES7511-1AK02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0)", "product_id": "368", "product_identification_helper": { "model_numbers": [ "6ES7511-1CK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0)", "product_id": "369", "product_identification_helper": { "model_numbers": [ "6ES7511-1CK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK00-0AB0)", "product_id": "370", "product_identification_helper": { "model_numbers": [ "6ES7511-1FK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0)", "product_id": "371", "product_identification_helper": { "model_numbers": [ "6ES7511-1FK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0)", "product_id": "372", "product_identification_helper": { "model_numbers": [ "6ES7511-1FK02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0)", "product_id": "373", "product_identification_helper": { "model_numbers": [ "6ES7511-1TK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0)", "product_id": "374", "product_identification_helper": { "model_numbers": [ "6ES7511-1UK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0)", "product_id": "375", "product_identification_helper": { "model_numbers": [ "6ES7512-1CK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0)", "product_id": "376", "product_identification_helper": { "model_numbers": [ "6ES7512-1CK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0)", "product_id": "377", "product_identification_helper": { "model_numbers": [ "6ES7512-1SK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0)", "product_id": "378", "product_identification_helper": { "model_numbers": [ "6ES7512-1SK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK00-0AB0)", "product_id": "379", "product_identification_helper": { "model_numbers": [ "6ES7512-1DK00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0)", "product_id": "380", "product_identification_helper": { "model_numbers": [ "6ES7512-1DK01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL00-0AB0)", "product_id": "381", "product_identification_helper": { "model_numbers": [ "6ES7513-1AL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0)", "product_id": "382", "product_identification_helper": { "model_numbers": [ "6ES7513-1AL01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0)", "product_id": "383", "product_identification_helper": { "model_numbers": [ "6ES7513-1AL02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL00-0AB0)", "product_id": "384", "product_identification_helper": { "model_numbers": [ "6ES7513-1FL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0)", "product_id": "385", "product_identification_helper": { "model_numbers": [ "6ES7513-1FL01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0)", "product_id": "386", "product_identification_helper": { "model_numbers": [ "6ES7513-1FL02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0)", "product_id": "387", "product_identification_helper": { "model_numbers": [ "6ES7513-1RL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM00-0AB0)", "product_id": "388", "product_identification_helper": { "model_numbers": [ "6ES7515-2AM00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0)", "product_id": "389", "product_identification_helper": { "model_numbers": [ "6ES7515-2AM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0)", "product_id": "390", "product_identification_helper": { "model_numbers": [ "6ES7515-2AM02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM00-0AB0)", "product_id": "391", "product_identification_helper": { "model_numbers": [ "6ES7515-2FM00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0)", "product_id": "392", "product_identification_helper": { "model_numbers": [ "6ES7515-2FM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0)", "product_id": "393", "product_identification_helper": { "model_numbers": [ "6ES7515-2FM02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0)", "product_id": "394", "product_identification_helper": { "model_numbers": [ "6ES7515-2RM00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0)", "product_id": "395", "product_identification_helper": { "model_numbers": [ "6ES7515-2TM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0)", "product_id": "396", "product_identification_helper": { "model_numbers": [ "6ES7515-2UM01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN00-0AB0)", "product_id": "397", "product_identification_helper": { "model_numbers": [ "6ES7516-3AN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0)", "product_id": "398", "product_identification_helper": { "model_numbers": [ "6ES7516-3AN01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0)", "product_id": "399", "product_identification_helper": { "model_numbers": [ "6ES7516-3AN02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN00-0AB0)", "product_id": "400", "product_identification_helper": { "model_numbers": [ "6ES7516-3FN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0)", "product_id": "401", "product_identification_helper": { "model_numbers": [ "6ES7516-3FN01-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0)", "product_id": "402", "product_identification_helper": { "model_numbers": [ "6ES7516-3FN02-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0)", "product_id": "403", "product_identification_helper": { "model_numbers": [ "6ES7516-3TN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0)", "product_id": "404", "product_identification_helper": { "model_numbers": [ "6ES7516-3UN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0)", "product_id": "405", "product_identification_helper": { "model_numbers": [ "6ES7517-3AP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0)", "product_id": "406", "product_identification_helper": { "model_numbers": [ "6ES7517-3FP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0)", "product_id": "407", "product_identification_helper": { "model_numbers": [ "6ES7517-3HP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0)", "product_id": "408", "product_identification_helper": { "model_numbers": [ "6ES7517-3TP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0)", "product_id": "409", "product_identification_helper": { "model_numbers": [ "6ES7517-3UP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0)", "product_id": "410", "product_identification_helper": { "model_numbers": [ "6ES7518-4AP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)", "product_id": "411", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0)", "product_id": "412", "product_identification_helper": { "model_numbers": [ "6ES7518-4FP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)", "product_id": "413", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0)", "product_id": "414", "product_identification_helper": { "model_numbers": [ "6ES7518-4JP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0)", "product_id": "415", "product_identification_helper": { "model_numbers": [ "6ES7518-4TP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0)", "product_id": "416", "product_identification_helper": { "model_numbers": [ "6ES7518-4UP00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0)", "product_id": "417", "product_identification_helper": { "model_numbers": [ "6ES7518-4AP00-3AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0)", "product_id": "418", "product_identification_helper": { "model_numbers": [ "6ES7518-4FP00-3AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0)", "product_id": "419", "product_identification_helper": { "model_numbers": [ "6ES7513-2GL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0)", "product_id": "420", "product_identification_helper": { "model_numbers": [ "6ES7513-2PL00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0)", "product_id": "421", "product_identification_helper": { "model_numbers": [ "6ES7516-2GN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0)", "product_id": "422", "product_identification_helper": { "model_numbers": [ "6ES7516-2PN00-0AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV21.9.7", "product": { "name": "SIMATIC S7-1500 Software Controller V2", "product_id": "423" } } ], "category": "product_name", "name": "SIMATIC S7-1500 Software Controller V2" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.0", "product": { "name": "SIMATIC S7-PLCSIM Advanced", "product_id": "424" } } ], "category": "product_name", "name": "SIMATIC S7-PLCSIM Advanced" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC STEP 7 (TIA Portal)", "product_id": "425" } } ], "category": "product_name", "name": "SIMATIC STEP 7 (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.7 HF4", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "426" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 Update 5", "product": { "name": "SIMATIC WinCC Unified (TIA Portal)", "product_id": "427" } } ], "category": "product_name", "name": "SIMATIC WinCC Unified (TIA Portal)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC WinCC V7.3", "product_id": "428" } } ], "category": "product_name", "name": "SIMATIC WinCC V7.3" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V7.4 SP1 Update 22", "product": { "name": "SIMATIC WinCC V7.4", "product_id": "429" } } ], "category": "product_name", "name": "SIMATIC WinCC V7.4" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V7.5 SP2 Update 16", "product": { "name": "SIMATIC WinCC V7.5", "product_id": "430" } } ], "category": "product_name", "name": "SIMATIC WinCC V7.5" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V5.1\u003cV5.5.1", "product": { "name": "SIMOTION", "product_id": "431" } } ], "category": "product_name", "name": "SIMOTION" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT Software ST7sc", "product_id": "432" } } ], "category": "product_name", "name": "SINAUT Software ST7sc" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINAUT ST7CC", "product_id": "433" } } ], "category": "product_name", "name": "SINAUT ST7CC" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP2", "product": { "name": "SINEC INS", "product_id": "434" } } ], "category": "product_name", "name": "SINEC INS" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP3", "product": { "name": "SINEC NMS", "product_id": "435" } } ], "category": "product_name", "name": "SINEC NMS" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.1", "product": { "name": "SINEMA Remote Connect Server", "product_id": "436" } } ], "category": "product_name", "name": "SINEMA Remote Connect Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "437", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2.28", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "438", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0)", "product_id": "439", "product_identification_helper": { "model_numbers": [ "6AG1510-1SJ01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0)", "product_id": "440", "product_identification_helper": { "model_numbers": [ "6AG2510-1SJ01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0)", "product_id": "441", "product_identification_helper": { "model_numbers": [ "6AG1510-1DJ01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0)", "product_id": "442", "product_identification_helper": { "model_numbers": [ "6AG1510-1DJ01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0)", "product_id": "443", "product_identification_helper": { "model_numbers": [ "6AG2510-1DJ01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0)", "product_id": "444", "product_identification_helper": { "model_numbers": [ "6AG2510-1DJ01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK00-2AB0)", "product_id": "445", "product_identification_helper": { "model_numbers": [ "6AG1512-1SK00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0)", "product_id": "446", "product_identification_helper": { "model_numbers": [ "6AG1512-1SK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0)", "product_id": "447", "product_identification_helper": { "model_numbers": [ "6AG1512-1SK01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0)", "product_id": "448", "product_identification_helper": { "model_numbers": [ "6AG2512-1SK01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0)", "product_id": "449", "product_identification_helper": { "model_numbers": [ "6AG2512-1SK01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0)", "product_id": "450", "product_identification_helper": { "model_numbers": [ "6AG1512-1DK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0)", "product_id": "451", "product_identification_helper": { "model_numbers": [ "6AG1512-1DK01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0)", "product_id": "452", "product_identification_helper": { "model_numbers": [ "6AG2512-1DK01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0)", "product_id": "453", "product_identification_helper": { "model_numbers": [ "6AG2512-1DK01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)", "product_id": "454", "product_identification_helper": { "model_numbers": [ "6AG1343-1GX31-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3", "product": { "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)", "product_id": "455", "product_identification_helper": { "model_numbers": [ "6AG1443-1GX30-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)", "product_id": "456", "product_identification_helper": { "model_numbers": [ "6AG1242-7KX31-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.37", "product": { "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)", "product_id": "457", "product_identification_helper": { "model_numbers": [ "6AG1543-1AX00-2XE0" ] } } } ], "category": "product_name", "name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.5.2", "product": { "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)", "product_id": "458", "product_identification_helper": { "model_numbers": [ "6AG1202-2BH00-2BA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)", "product_id": "459", "product_identification_helper": { "model_numbers": [ "6AG1308-2FL10-4AA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)", "product_id": "460", "product_identification_helper": { "model_numbers": [ "6AG1206-2BB00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)", "product_id": "461", "product_identification_helper": { "model_numbers": [ "6AG1206-2BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)", "product_id": "462", "product_identification_helper": { "model_numbers": [ "6AG1208-0BA00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV4.4", "product": { "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)", "product_id": "463", "product_identification_helper": { "model_numbers": [ "6AG1216-4BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)", "product_id": "464", "product_identification_helper": { "model_numbers": [ "6AG1243-1BX30-2AX0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.4.29", "product": { "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)", "product_id": "465", "product_identification_helper": { "model_numbers": [ "6AG2243-1BX30-1XE0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK00-2AB0)", "product_id": "466", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0)", "product_id": "467", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0)", "product_id": "468", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0)", "product_id": "469", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0)", "product_id": "470", "product_identification_helper": { "model_numbers": [ "6AG1511-1AK02-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0)", "product_id": "471", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK01-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0)", "product_id": "472", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK02-1AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0)", "product_id": "473", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0)", "product_id": "474", "product_identification_helper": { "model_numbers": [ "6AG2511-1AK02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK00-2AB0)", "product_id": "475", "product_identification_helper": { "model_numbers": [ "6AG1511-1FK00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0)", "product_id": "476", "product_identification_helper": { "model_numbers": [ "6AG1511-1FK01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0)", "product_id": "477", "product_identification_helper": { "model_numbers": [ "6AG1511-1FK02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL00-2AB0)", "product_id": "478", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0)", "product_id": "479", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0)", "product_id": "480", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0)", "product_id": "481", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0)", "product_id": "482", "product_identification_helper": { "model_numbers": [ "6AG1513-1AL02-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL00-2AB0)", "product_id": "483", "product_identification_helper": { "model_numbers": [ "6AG1513-1FL00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0)", "product_id": "484", "product_identification_helper": { "model_numbers": [ "6AG1513-1FL01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0)", "product_id": "485", "product_identification_helper": { "model_numbers": [ "6AG1513-1FL02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0)", "product_id": "486", "product_identification_helper": { "model_numbers": [ "6AG1515-2FM01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0)", "product_id": "487", "product_identification_helper": { "model_numbers": [ "6AG1515-2FM02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0)", "product_id": "488", "product_identification_helper": { "model_numbers": [ "6AG2515-2FM02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0)", "product_id": "489", "product_identification_helper": { "model_numbers": [ "6AG2515-2FM01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0)", "product_id": "490", "product_identification_helper": { "model_numbers": [ "6AG1515-2RM00-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0)", "product_id": "491", "product_identification_helper": { "model_numbers": [ "6AG2515-2RM00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-2AB0)", "product_id": "492", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-7AB0)", "product_id": "493", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN00-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN00-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0)", "product_id": "494", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0)", "product_id": "495", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN01-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0)", "product_id": "496", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0)", "product_id": "497", "product_identification_helper": { "model_numbers": [ "6AG1516-3AN02-7AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0)", "product_id": "498", "product_identification_helper": { "model_numbers": [ "6AG2516-3AN02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0)", "product_id": "499", "product_identification_helper": { "model_numbers": [ "6AG2516-3AN01-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN00-2AB0)", "product_id": "500", "product_identification_helper": { "model_numbers": [ "6AG1516-3FN00-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN00-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0)", "product_id": "501", "product_identification_helper": { "model_numbers": [ "6AG1516-3FN01-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0)", "product_id": "502", "product_identification_helper": { "model_numbers": [ "6AG1516-3FN02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0)", "product_id": "503", "product_identification_helper": { "model_numbers": [ "6AG2516-3FN02-2AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.9.7", "product": { "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0)", "product_id": "504", "product_identification_helper": { "model_numbers": [ "6AG2516-3FN02-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0)", "product_id": "505", "product_identification_helper": { "model_numbers": [ "6AG1517-3HP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0)", "product_id": "506", "product_identification_helper": { "model_numbers": [ "6AG1518-4AP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)", "product_id": "507", "product_identification_helper": { "model_numbers": [ "6AG1518-4AX00-4AC0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0)", "product_id": "508", "product_identification_helper": { "model_numbers": [ "6AG1518-4FP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.0.1", "product": { "name": "SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0)", "product_id": "509", "product_identification_helper": { "model_numbers": [ "6AG1518-4JP00-4AB0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4.8", "product": { "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)", "product_id": "510", "product_identification_helper": { "model_numbers": [ "6AG1543-1MX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV3.1.1", "product": { "name": "TeleControl Server Basic V3", "product_id": "511" } } ], "category": "product_name", "name": "TeleControl Server Basic V3" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V1.0 SP8", "product": { "name": "TIA Administrator", "product_id": "512" } } ], "category": "product_name", "name": "TIA Administrator" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4.8", "product": { "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)", "product_id": "513", "product_identification_helper": { "model_numbers": [ "6GK7543-1MX00-0XE0" ] } } } ], "category": "product_name", "name": "TIM 1531 IRC (6GK7543-1MX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V15", "product_id": "514" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V15" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V16", "product_id": "515" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V16" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V17 Update 5", "product": { "name": "Totally Integrated Automation Portal (TIA Portal) V17", "product_id": "516" } } ], "category": "product_name", "name": "Totally Integrated Automation Portal (TIA Portal) V17" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14", "15", "16", "17", "18", "19", "20", "21", "22", "23", "24", "25", "26", "27", "28", "29", "30", "31", "32", "33", "34", "35", "36", "37", "38", "39", "40", "41", "42", "43", "93", "94", "95", "96", "97", "98", "99", "100", "101", "44", "45", "46", "47", "48", "49", "50", "51", "52", "53", "54", "55", "56", "57", "58", "59", "60", "61", "62", "63", "64", "65", "66", "67", "68", "69", "70", "71", "72", "73", "74", "75", "76", "77", "78", "79", "80", "81", "82", "83", "84", "85", "86", "87", "88", "89", "90", "91", "92", "102", "103", "104", "105", "106", "107", "108", "109", "110", "111", "112", "113", "114", "115", "116", "117", "118", "119", "120", "121", "122", "123", "124", "125", "126", "127", "128", "129", "130", "131", "132", "133", "141", "140", "139", "138", "137", "136", "135", "134", "142", "143", "151", "150", "149", "148", "147", "146", "145", "144", "152", "153", "154", "155", "156", "157", "158", "159", "160", "161", "162", "163", "164", "165", "166", "167", "168", "169", "170", "171", "172", "173", "174", "175", "176", "177", "178", "179", "180", "181", "182", "183", "184", "185", "186", "187", "188", "189", "190", "191", "192", "193", "194", "195", "196", "197", "198", "199", "200", "201", "202", "203", "204", "205", "206", "207", "208", "209", "210", "211", "212", "213", "214", "215", "216", "217", "218", "219", "220", "221", "222", "223", "224", "225", "226", "227", "228", "229", "230", "231", "232", "233", "234", "235", "236", "237", "238", "239", "240", "241", "242", "243", "244", "245", "246", "247", "273", "274", "275", "276", "269", "270", "271", "272", "277", "278", "260", "261", "262", "263", "256", "257", "258", "259", "252", "253", "254", "255", "248", "249", "250", "251", "266", "267", "264", "265", "268", "279", "280", "281", "282", "285", "286", "283", "284", "287", "288", "289", "290", "293", "294", "291", "292", "295", "296", "299", "300", "297", "298", "303", "302", "301", "304", "308", "307", "305", "306", "309", "310", "311", "315", "316", "317", "318", "319", "320", "321", "322", "323", "324", "325", "312", "313", "314", "326", "327", "328", "329", "330", "331", "332", "333", "334", "335", "336", "337", "338", "339", "340", "341", "342", "343", "344", "345", "346", "347", "348", "349", "350", "351", "352", "353", "354", "355", "356", "357", "358", "359", "360", "361", "362", "363", "364", "365", "366", "367", "368", "369", "370", "371", "372", "373", "374", "375", "376", "377", "378", "379", "380", "381", "382", "383", "384", "385", "386", "387", "388", "389", "390", "391", "392", "393", "394", "395", "396", "397", "398", "399", "400", "401", "402", "403", "404", "405", "406", "407", "408", "409", "410", "411", "412", "413", "414", "415", "416", "417", "418", "419", "420", "421", "422", "423", "424", "425", "426", "427", "428", "429", "430", "431", "432", "433", "434", "435", "436", "437", "438", "439", "440", "441", "442", "443", "444", "445", "446", "447", "448", "449", "450", "451", "452", "453", "456", "457", "454", "455", "458", "459", "460", "461", "462", "463", "464", "465", "466", "467", "468", "469", "470", "471", "472", "473", "474", "475", "476", "477", "478", "479", "480", "481", "482", "483", "484", "485", "486", "487", "488", "489", "490", "491", "492", "493", "494", "495", "496", "497", "498", "499", "500", "501", "502", "503", "504", "505", "506", "507", "508", "509", "510", "511", "512", "513", "514", "515", "516" ] }, "remediations": [ { "category": "mitigation", "details": "For the unfixed component in this version (OpenPCS 7): Restrict access to the OPC UA interface of OpenPCS 7 to trusted systems", "product_ids": [ "344" ] }, { "category": "mitigation", "details": "Restrict access to the OPC UA interface to trusted systems", "product_ids": [ "3", "4", "5" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "3", "4", "5", "44", "45", "46", "47", "48", "49", "50", "51", "52", "53", "54", "55", "56", "57", "58", "59", "60", "61", "62", "63", "64", "65", "66", "67", "68", "69", "70", "71", "72", "73", "74", "75", "76", "77", "78", "79", "80", "81", "82", "83", "84", "85", "86", "87", "88", "89", "90", "91", "92", "118", "119", "120", "121", "122", "126", "127", "128", "129", "130", "131", "132", "133", "141", "140", "139", "138", "137", "136", "135", "134", "142", "143", "151", "150", "149", "148", "147", "146", "145", "144", "152", "153", "154", "155", "156", "157", "158", "159", "160", "161", "162", "163", "164", "165", "166", "167", "168", "169", "170", "171", "172", "173", "174", "175", "176", "224", "227", "232", "233", "273", "274", "275", "276", "269", "270", "271", "272", "277", "278", "260", "261", "262", "263", "256", "257", "258", "259", "252", "253", "254", "255", "248", "249", "250", "251", "266", "267", "264", "265", "268", "309", "324", "325", "312", "314", "337", "338", "342", "343", "361", "363", "365", "370", "377", "379", "381", "384", "388", "391", "397", "400", "428", "432", "433", "445", "454", "459", "466", "475", "478", "483", "492", "493", "500", "514", "515" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "93", "94", "98", "99", "100", "101", "323", "425" ] }, { "category": "vendor_fix", "details": "Update to V1.0 SP2 or later version", "product_ids": [ "434" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812610/" }, { "category": "vendor_fix", "details": "Update to V1.0 SP3 or later version", "product_ids": [ "435" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109813788/" }, { "category": "vendor_fix", "details": "Update to V17 SP1 Update 1 or later version", "product_ids": [ "340" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109820674/" }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "516" ] }, { "category": "vendor_fix", "details": "Update to V2.2.28 or later version", "product_ids": [ "320", "322", "437", "438" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817067/" }, { "category": "vendor_fix", "details": "Update to V2.4.8 or later version", "product_ids": [ "510", "513" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954889/" }, { "category": "vendor_fix", "details": "Update to V2.9.7 or later version", "product_ids": [ "362", "364", "366", "367", "368", "369", "371", "372", "373", "374", "375", "376", "378", "380", "382", "383", "385", "386", "387", "389", "390", "392", "393", "394", "395", "396", "398", "399", "401", "402", "417", "418", "419", "420", "421", "422", "439", "440", "441", "442", "443", "444", "446", "447", "448", "449", "450", "451", "452", "453", "467", "468", "469", "470", "471", "472", "473", "474", "476", "477", "479", "480", "481", "482", "484", "485", "486", "487", "488", "489", "490", "491", "494", "495", "496", "497", "498", "499", "501", "502", "503", "504" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/" }, { "category": "vendor_fix", "details": "Update to V2.9.7 or later version", "product_ids": [ "326", "327" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109773914/" }, { "category": "vendor_fix", "details": "Update to V21.9.7 or later version", "product_ids": [ "328" ] }, { "category": "vendor_fix", "details": "Update to V21.9.7 or later version", "product_ids": [ "423" ] }, { "category": "vendor_fix", "details": "Update to V3.0.1 or later version", "product_ids": [ "403", "404", "405", "406", "407", "408", "409", "410", "411", "412", "413", "414", "415", "416", "505", "506", "507", "508", "509" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/" }, { "category": "vendor_fix", "details": "Update to V3.0.37 or later version", "product_ids": [ "321", "457" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109828349/" }, { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "436" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811169/" }, { "category": "vendor_fix", "details": "Update to V3.1.1 or later version", "product_ids": [ "511" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812231/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "331" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811878/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "313", "455" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817938/" }, { "category": "vendor_fix", "details": "Update to V3.4.29 or later version", "product_ids": [ "315", "316", "317", "318", "319", "456", "464", "465" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109823721/" }, { "category": "vendor_fix", "details": "Update to V4.0 or later version", "product_ids": [ "345" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814551/" }, { "category": "vendor_fix", "details": "Update to V4.4 or later version", "product_ids": [ "177", "178", "179", "180", "181", "182", "183", "184", "185", "186", "187", "188", "189", "190", "191", "192", "193", "194", "195", "196", "197", "198", "199", "200", "201", "202", "203", "204", "205", "206", "207", "208", "209", "210", "211", "212", "213", "214", "215", "216", "217", "218", "219", "220", "221", "225", "226", "228", "229", "240", "241", "242", "243", "244", "245", "246", "247", "279", "280", "281", "282", "285", "286", "283", "284", "287", "288", "460", "461", "462", "463" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817768/" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version", "product_ids": [ "424" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809300/" }, { "category": "vendor_fix", "details": "Update to V5.5.1 or later version", "product_ids": [ "431" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812773/" }, { "category": "vendor_fix", "details": "Update to V5.5.2 or later version", "product_ids": [ "111", "112", "113", "114", "115", "116", "117", "123", "124", "125", "222", "223", "230", "231", "458" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817790/" }, { "category": "vendor_fix", "details": "Update to V7.2 or later version", "product_ids": [ "7", "8", "21", "22", "23", "24", "25", "26", "27", "28", "29", "30", "31", "32", "33", "34", "35", "36", "37", "38" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109817007/" }, { "category": "vendor_fix", "details": "Update to V7.4 SP1 Update 22 or later version", "product_ids": [ "429" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826450/" }, { "category": "vendor_fix", "details": "Update to V7.5 SP2 Update 16 or later version", "product_ids": [ "430" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109793460/" }, { "category": "vendor_fix", "details": "Update to V9.1 Update 1 or later version", "product_ids": [ "341" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826159/" }, { "category": "vendor_fix", "details": "Update to V9.1 SP2 UC04 or later version", "product_ids": [ "344" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812242/" }, { "category": "vendor_fix", "details": "Update to V9.2 SP2 or later version", "product_ids": [ "346" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811911/" }, { "category": "vendor_fix", "details": "Update to V18 or later version", "product_ids": [ "329" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109746530/" }, { "category": "vendor_fix", "details": "Update to V4.6.0 or later version", "product_ids": [ "360" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814248/" }, { "category": "vendor_fix", "details": "Update to V4.0.1 or later version", "product_ids": [ "355", "356", "357", "358", "359" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811014/" }, { "category": "vendor_fix", "details": "Update to V5.7 HF4 or later version", "product_ids": [ "426" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811212/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "348", "349", "350", "351", "352", "353" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811120/" }, { "category": "vendor_fix", "details": "Update to V2.15.1 or later version", "product_ids": [ "9", "10", "11", "12", "13", "14", "15", "16", "17", "18", "19" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Update to V1.6 Upd6 or later version", "product_ids": [ "330" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109805072/" }, { "category": "vendor_fix", "details": "Update to V1.0 SP8 or later version", "product_ids": [ "512" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/114358/" }, { "category": "vendor_fix", "details": "Update to V16 Update 6 or later version", "product_ids": [ "339" ] }, { "category": "vendor_fix", "details": "Update to V2020 SP1 Update 1 or later version\nIn the context of SIMATIC PCS neo, update to SIMATIC PCS neo V4.0 or later version (\u003chttps://support.industry.siemens.com/cs/ww/de/view/109814551/\u003e); in the context of SIMATIC PCS 7, update to SIMATIC PCS 7 V9.1 SP2 or later version (\u003chttps://support.industry.siemens.com/cs/ww/en/view/109812240/\u003e); in the context of SIMATIC WinCC, contact local support", "product_ids": [ "347" ] }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "20" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "vendor_fix", "details": "Update to V2.0.1 or later version", "product_ids": [ "354" ], "url": "https://support.industry.siemens.com/cs/de/en/view/109811118/" }, { "category": "vendor_fix", "details": "Update to V2.3.1 or later version", "product_ids": [ "39", "40", "41", "42", "43" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810992/" }, { "category": "vendor_fix", "details": "Update to V1.9 or later version", "product_ids": [ "310", "311" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812235/" }, { "category": "vendor_fix", "details": "Update to V3.3 or later version", "product_ids": [ "332", "333", "334", "335", "336" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811878/" }, { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "102", "103", "104", "105", "106", "107", "108", "109", "110" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/" }, { "category": "vendor_fix", "details": "Update ROX II to V2.15.1 or later version", "product_ids": [ "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109810800/" }, { "category": "vendor_fix", "details": "Update to V6.5 or later version", "product_ids": [ "234", "235", "236", "237", "238", "239", "289", "290", "293", "294", "291", "292", "295", "296", "299", "300", "297", "298", "303", "302", "301", "304", "308", "307", "305", "306" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109809635/" }, { "category": "vendor_fix", "details": "Use the Edge Management System to update to V1.7 or later version", "product_ids": [ "1", "2" ], "url": "https://www.siemens.com/industrial-edge-marketplace/" }, { "category": "vendor_fix", "details": "Update to V8.7.1.11 or later version", "product_ids": [ "95", "96", "97" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109816886/" }, { "category": "vendor_fix", "details": "Update to V17 Update 5 or later version", "product_ids": [ "427" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109792171/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14", "15", "16", "17", "18", "19", "20", "21", "22", "23", "24", "25", "26", "27", "28", "29", "30", "31", "32", "33", "34", "35", "36", "37", "38", "39", "40", "41", "42", "43", "93", "94", "95", "96", "97", "98", "99", "100", "101", "44", "45", "46", "47", "48", "49", "50", "51", "52", "53", "54", "55", "56", "57", "58", "59", "60", "61", "62", "63", "64", "65", "66", "67", "68", "69", "70", "71", "72", "73", "74", "75", "76", "77", "78", "79", "80", "81", "82", "83", "84", "85", "86", "87", "88", "89", "90", "91", "92", "102", "103", "104", "105", "106", "107", "108", "109", "110", "111", "112", "113", "114", "115", "116", "117", "118", "119", "120", "121", "122", "123", "124", "125", "126", "127", "128", "129", "130", "131", "132", "133", "141", "140", "139", "138", "137", "136", "135", "134", "142", "143", "151", "150", "149", "148", "147", "146", "145", "144", "152", "153", "154", "155", "156", "157", "158", "159", "160", "161", "162", "163", "164", "165", "166", "167", "168", "169", "170", "171", "172", "173", "174", "175", "176", "177", "178", "179", "180", "181", "182", "183", "184", "185", "186", "187", "188", "189", "190", "191", "192", "193", "194", "195", "196", "197", "198", "199", "200", "201", "202", "203", "204", "205", "206", "207", "208", "209", "210", "211", "212", "213", "214", "215", "216", "217", "218", "219", "220", "221", "222", "223", "224", "225", "226", "227", "228", "229", "230", "231", "232", "233", "234", "235", "236", "237", "238", "239", "240", "241", "242", "243", "244", "245", "246", "247", "273", "274", "275", "276", "269", "270", "271", "272", "277", "278", "260", "261", "262", "263", "256", "257", "258", "259", "252", "253", "254", "255", "248", "249", "250", "251", "266", "267", "264", "265", "268", "279", "280", "281", "282", "285", "286", "283", "284", "287", "288", "289", "290", "293", "294", "291", "292", "295", "296", "299", "300", "297", "298", "303", "302", "301", "304", "308", "307", "305", "306", "309", "310", "311", "315", "316", "317", "318", "319", "320", "321", "322", "323", "324", "325", "312", "313", "314", "326", "327", "328", "329", "330", "331", "332", "333", "334", "335", "336", "337", "338", "339", "340", "341", "342", "343", "344", "345", "346", "347", "348", "349", "350", "351", "352", "353", "354", "355", "356", "357", "358", "359", "360", "361", "362", "363", "364", "365", "366", "367", "368", "369", "370", "371", "372", "373", "374", "375", "376", "377", "378", "379", "380", "381", "382", "383", "384", "385", "386", "387", "388", "389", "390", "391", "392", "393", "394", "395", "396", "397", "398", "399", "400", "401", "402", "403", "404", "405", "406", "407", "408", "409", "410", "411", "412", "413", "414", "415", "416", "417", "418", "419", "420", "421", "422", "423", "424", "425", "426", "427", "428", "429", "430", "431", "432", "433", "434", "435", "436", "437", "438", "439", "440", "441", "442", "443", "444", "445", "446", "447", "448", "449", "450", "451", "452", "453", "456", "457", "454", "455", "458", "459", "460", "461", "462", "463", "464", "465", "466", "467", "468", "469", "470", "471", "472", "473", "474", "475", "476", "477", "478", "479", "480", "481", "482", "483", "484", "485", "486", "487", "488", "489", "490", "491", "492", "493", "494", "495", "496", "497", "498", "499", "500", "501", "502", "503", "504", "505", "506", "507", "508", "509", "510", "511", "512", "513", "514", "515", "516" ] } ], "title": "CVE-2022-0778" } ] }
SSA-398330
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nThese GNU/Linux vulnerabilities have been externally identified. Siemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.\n\nNote: This SSA advises vulnerabilities for firmware version V3.1 only; for versions \u003c V3.1 refer to Siemens Security Bulletin SSB-439005 (\nhttps://cert-portal.siemens.com/productcert/html/ssb-439005.html).", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-398330.json" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398330.pdf" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-398330.txt" } ], "title": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1", "tracking": { "current_release_date": "2024-06-11T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-398330", "initial_release_date": "2023-12-12T00:00:00Z", "revision_history": [ { "date": "2023-12-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2021-44879, CVE-2023-46218, CVE-2023-46219, and CVE-2023-48795" }, { "date": "2024-02-13T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-45898, CVE-2023-46862, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2024-0584" }, { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added CVE-2023-52425, CVE-2023-52426, CVE-2023-45918" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added CVE-2024-28757" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.5", "number": "6", "summary": "Added CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-2511, CVE-2024-28085, CVE-2024-28182, CVE-2024-28834, CVE-2024-28835" }, { "date": "2024-06-11T00:00:00Z", "legacy_version": "1.6", "number": "7", "summary": "Added CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34459" } ], "status": "interim", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)", "product_id": "2", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)", "product_id": "3", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)", "product_id": "4", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)", "product_id": "5", "product_identification_helper": { "model_numbers": [ "6AG1518-4AX00-4AC0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0340", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2013-0340" }, { "cve": "CVE-2013-4235", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "summary", "text": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2013-4235" }, { "cve": "CVE-2014-7209", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2014-7209" }, { "cve": "CVE-2015-20107", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2015-20107" }, { "cve": "CVE-2016-3189", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-3189" }, { "cve": "CVE-2016-3709", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-3709" }, { "cve": "CVE-2016-4658", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-4658" }, { "cve": "CVE-2016-5131", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-5131" }, { "cve": "CVE-2016-9318", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-9318" }, { "cve": "CVE-2016-10228", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-10228" }, { "cve": "CVE-2016-10739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-10739" }, { "cve": "CVE-2017-0663", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-0663" }, { "cve": "CVE-2017-7375", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-7375" }, { "cve": "CVE-2017-7376", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-7376" }, { "cve": "CVE-2017-9047", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9047" }, { "cve": "CVE-2017-9048", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9048" }, { "cve": "CVE-2017-9049", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9049" }, { "cve": "CVE-2017-9050", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9050" }, { "cve": "CVE-2017-16931", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a \u0027%\u0027 character in a DTD name.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-16931" }, { "cve": "CVE-2017-16932", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-16932" }, { "cve": "CVE-2017-17512", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-17512" }, { "cve": "CVE-2017-18258", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-18258" }, { "cve": "CVE-2018-0495", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-0495" }, { "cve": "CVE-2018-12886", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-12886" }, { "cve": "CVE-2018-14404", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14567", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-14567" }, { "cve": "CVE-2018-18928", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-18928" }, { "cve": "CVE-2018-19591", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-19591" }, { "cve": "CVE-2018-20482", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user\u0027s process (e.g., a system backup running as root).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-20482" }, { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-20843" }, { "cve": "CVE-2018-25032", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-25032" }, { "cve": "CVE-2019-3855", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3855" }, { "cve": "CVE-2019-3856", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3856" }, { "cve": "CVE-2019-3857", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3857" }, { "cve": "CVE-2019-3858", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3858" }, { "cve": "CVE-2019-3859", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3859" }, { "cve": "CVE-2019-3860", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3860" }, { "cve": "CVE-2019-3861", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3861" }, { "cve": "CVE-2019-3862", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3862" }, { "cve": "CVE-2019-3863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3863" }, { "cve": "CVE-2019-5018", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5018" }, { "cve": "CVE-2019-5094", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5094" }, { "cve": "CVE-2019-5188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5188" }, { "cve": "CVE-2019-5435", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in curl\u0027s URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5435" }, { "cve": "CVE-2019-5436", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5436" }, { "cve": "CVE-2019-5443", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl \u003c= 7.65.1 automatically run the code (as an openssl \"engine\") on invocation. If that curl is invoked by a privileged user it can do anything it wants.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5443" }, { "cve": "CVE-2019-5481", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5481" }, { "cve": "CVE-2019-5482", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5482" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-6488", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6488" }, { "cve": "CVE-2019-7309", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-7309" }, { "cve": "CVE-2019-8457", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-8457" }, { "cve": "CVE-2019-9169", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9169" }, { "cve": "CVE-2019-9636", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9636" }, { "cve": "CVE-2019-9674", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9674" }, { "cve": "CVE-2019-9740", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9740" }, { "cve": "CVE-2019-9923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9923" }, { "cve": "CVE-2019-9936", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9936" }, { "cve": "CVE-2019-9937", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9937" }, { "cve": "CVE-2019-9947", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9947" }, { "cve": "CVE-2019-9948", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9948" }, { "cve": "CVE-2019-10160", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "summary", "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-10160" }, { "cve": "CVE-2019-11360", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-11360" }, { "cve": "CVE-2019-12290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-12290" }, { "cve": "CVE-2019-12900", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-12900" }, { "cve": "CVE-2019-12904", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor\u0027s position is that the issue report cannot be validated because there is no description of an attack", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-12904" }, { "cve": "CVE-2019-13057", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-13057" }, { "cve": "CVE-2019-13565", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-13565" }, { "cve": "CVE-2019-13627", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-13627" }, { "cve": "CVE-2019-15847", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-15847" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-15903" }, { "cve": "CVE-2019-16056", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-16056" }, { "cve": "CVE-2019-16168", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-16168" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-16905" }, { "cve": "CVE-2019-17498", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17498" }, { "cve": "CVE-2019-17543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17543" }, { "cve": "CVE-2019-17594", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17594" }, { "cve": "CVE-2019-17595", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17595" }, { "cve": "CVE-2019-18224", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-18224" }, { "cve": "CVE-2019-18276", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "summary", "text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-18276" }, { "cve": "CVE-2019-18348", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-18348" }, { "cve": "CVE-2019-19126", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19126" }, { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19906", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19906" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2019-19956", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19956" }, { "cve": "CVE-2019-19959", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \u0027\\0\u0027 characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19959" }, { "cve": "CVE-2019-20218", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20218" }, { "cve": "CVE-2019-20367", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20367" }, { "cve": "CVE-2019-20388", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20388" }, { "cve": "CVE-2019-20795", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20795" }, { "cve": "CVE-2019-20907", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20907" }, { "cve": "CVE-2019-25013", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-25013" }, { "cve": "CVE-2019-1010022", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010022" }, { "cve": "CVE-2019-1010023", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010023" }, { "cve": "CVE-2019-1010024", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010024" }, { "cve": "CVE-2019-1010025", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor\u0027s position is \"ASLR bypass itself is not a vulnerability.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010025" }, { "cve": "CVE-2019-1010180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010180" }, { "cve": "CVE-2020-1712", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-1712" }, { "cve": "CVE-2020-1751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-1752" }, { "cve": "CVE-2020-6096", "cwe": { "id": "CWE-195", "name": "Signed to Unsigned Conversion Error" }, "notes": [ { "category": "summary", "text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-6096" }, { "cve": "CVE-2020-7595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-7595" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8315", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker\u0027s copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system\u0027s copy. Windows 8 and later are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8315" }, { "cve": "CVE-2020-8492", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8492" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-10029", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10029" }, { "cve": "CVE-2020-10531", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10531" }, { "cve": "CVE-2020-10543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10543" }, { "cve": "CVE-2020-10735", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10878", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10878" }, { "cve": "CVE-2020-11501", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 \u0027\\0\u0027 bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-11501" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-12062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12062" }, { "cve": "CVE-2020-12243", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12243" }, { "cve": "CVE-2020-12723", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12723" }, { "cve": "CVE-2020-12762", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12762" }, { "cve": "CVE-2020-13434", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13434" }, { "cve": "CVE-2020-13435", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13435" }, { "cve": "CVE-2020-13529", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13529" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13776", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13776" }, { "cve": "CVE-2020-13777", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13777" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-14145", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-14145" }, { "cve": "CVE-2020-14422", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-14422" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-15523", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15523" }, { "cve": "CVE-2020-15778", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15778" }, { "cve": "CVE-2020-15801", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15801" }, { "cve": "CVE-2020-19185", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19185" }, { "cve": "CVE-2020-19186", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19186" }, { "cve": "CVE-2020-19187", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19187" }, { "cve": "CVE-2020-19188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19188" }, { "cve": "CVE-2020-19189", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19189" }, { "cve": "CVE-2020-19190", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19190" }, { "cve": "CVE-2020-19909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19909" }, { "cve": "CVE-2020-21047", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-21047" }, { "cve": "CVE-2020-21913", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-21913" }, { "cve": "CVE-2020-22218", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-22218" }, { "cve": "CVE-2020-24659", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-24659" }, { "cve": "CVE-2020-24977", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-24977" }, { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-25692" }, { "cve": "CVE-2020-25709", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-25709" }, { "cve": "CVE-2020-25710", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-25710" }, { "cve": "CVE-2020-26116", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-26116" }, { "cve": "CVE-2020-27618", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-27618" }, { "cve": "CVE-2020-28196", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-28196" }, { "cve": "CVE-2020-29361", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29361" }, { "cve": "CVE-2020-29362", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29362" }, { "cve": "CVE-2020-29363", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29363" }, { "cve": "CVE-2020-29562", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29562" }, { "cve": "CVE-2020-29573", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29573" }, { "cve": "CVE-2020-35525", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-35525" }, { "cve": "CVE-2020-35527", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-35527" }, { "cve": "CVE-2020-36221", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36221" }, { "cve": "CVE-2020-36222", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36222" }, { "cve": "CVE-2020-36223", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36223" }, { "cve": "CVE-2020-36224", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36224" }, { "cve": "CVE-2020-36225", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36225" }, { "cve": "CVE-2020-36226", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36226" }, { "cve": "CVE-2020-36227", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36227" }, { "cve": "CVE-2020-36228", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36228" }, { "cve": "CVE-2020-36229", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36229" }, { "cve": "CVE-2020-36230", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36230" }, { "cve": "CVE-2021-3177", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3177" }, { "cve": "CVE-2021-3326", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3326" }, { "cve": "CVE-2021-3426", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3426" }, { "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3516" }, { "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3517" }, { "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3520", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3541", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3541" }, { "cve": "CVE-2021-3580", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3580" }, { "cve": "CVE-2021-3733", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3826", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3997", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3997" }, { "cve": "CVE-2021-3998", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3998" }, { "cve": "CVE-2021-3999", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4122", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-4122" }, { "cve": "CVE-2021-4189", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-4189" }, { "cve": "CVE-2021-4209", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in GnuTLS. As Nettle\u0027s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-4209" }, { "cve": "CVE-2021-20193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20193" }, { "cve": "CVE-2021-20227", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in SQLite\u0027s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20227" }, { "cve": "CVE-2021-20231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20231" }, { "cve": "CVE-2021-20232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20232" }, { "cve": "CVE-2021-20305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20305" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "**NOTE: CVE-2021-22898 is an incomplete fix (see https://hackerone.com/reports/1223882)! Check if affected products also have fixed CVE-22925 instead! Do not use CVE-2021-22898 in public advisories!**\r\n\r\ncurl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl. This rarely used option is used to send variable=content pairs to TELNET servers. Due to flaw in the option parser for sending `NEW_ENV` variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol. This could happen because curl did not call and use sscanf() correctly when parsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23336", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-23336" }, { "cve": "CVE-2021-27212", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27212" }, { "cve": "CVE-2021-27218", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27218" }, { "cve": "CVE-2021-27219", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27219" }, { "cve": "CVE-2021-27645", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27645" }, { "cve": "CVE-2021-28041", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28041" }, { "cve": "CVE-2021-28153", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28363", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn\u0027t given via proxy_config) doesn\u0027t verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28363" }, { "cve": "CVE-2021-28861", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28861" }, { "cve": "CVE-2021-31239", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue found in SQLite SQLite3 v.3.35.4 that could allow a remote attacker to cause a denial of service via the appendvfs.c function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-31239" }, { "cve": "CVE-2021-32292", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-32292" }, { "cve": "CVE-2021-33294", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33294" }, { "cve": "CVE-2021-33560", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33560" }, { "cve": "CVE-2021-33574", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33574" }, { "cve": "CVE-2021-33910", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33910" }, { "cve": "CVE-2021-35942", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-35942" }, { "cve": "CVE-2021-36084", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36084" }, { "cve": "CVE-2021-36085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36085" }, { "cve": "CVE-2021-36086", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36086" }, { "cve": "CVE-2021-36087", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36087" }, { "cve": "CVE-2021-36222", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-36690", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36690" }, { "cve": "CVE-2021-37600", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-37600" }, { "cve": "CVE-2021-37750", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-37750" }, { "cve": "CVE-2021-38604", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-38604" }, { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-41617" }, { "cve": "CVE-2021-43396", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious \u0027\\0\u0027 character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states \"the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there\u0027s no security impact to the bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-43396" }, { "cve": "CVE-2021-43618", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-43618" }, { "cve": "CVE-2021-44879", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45960", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46143" }, { "cve": "CVE-2021-46195", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0391", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like \u0027\\r\u0027 and \u0027\\n\u0027 in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0563", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-0563" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1271", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1304", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1343", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1343" }, { "cve": "CVE-2022-1434", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1434" }, { "cve": "CVE-2022-1473", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1473" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2274", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2274" }, { "cve": "CVE-2022-2509", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2509" }, { "cve": "CVE-2022-3715", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3821", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-3821" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-22576", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22576" }, { "cve": "CVE-2022-22822", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23852", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23990", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26488", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-26488" }, { "cve": "CVE-2022-27774", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl\u0027s \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "summary", "text": "The curl URL parser wrongly accepts percent-encoded URL separators like \u0027/\u0027when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server\u0027s certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27943" }, { "cve": "CVE-2022-28321", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn\u0027t correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-28321" }, { "cve": "CVE-2022-29155", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-29155" }, { "cve": "CVE-2022-29824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-29824" }, { "cve": "CVE-2022-30115", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-30115" }, { "cve": "CVE-2022-32205", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32221" }, { "cve": "CVE-2022-35252", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "summary", "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-35737" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-40674" }, { "cve": "CVE-2022-42898", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42915", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in curl \u003c7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop U+002E (.). Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-43680" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46908", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-46908" }, { "cve": "CVE-2022-48303", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48522", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-48522" }, { "cve": "CVE-2022-48560", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-48560" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0361", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0687", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It\u0027s basically trusted input or input that needs an actual security flaw to be compromised or controlled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0687" }, { "cve": "CVE-2023-1077", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1206", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-1206" }, { "cve": "CVE-2023-2650", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(square(n)) with \u0027n\u0027 being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer\u0027s certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-2650" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3212", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3212" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3609", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3609" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3772", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3772" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4016", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4016" }, { "cve": "CVE-2023-4039", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "summary", "text": "A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4039" }, { "cve": "CVE-2023-4527", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4527" }, { "cve": "CVE-2023-4623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-4806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4806" }, { "cve": "CVE-2023-4807", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4813", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4813" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-4921", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-5156", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5156" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5717", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5717" }, { "cve": "CVE-2023-5981", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5981" }, { "cve": "CVE-2023-6121", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6121" }, { "cve": "CVE-2023-6817", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6817" }, { "cve": "CVE-2023-6931", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6932" }, { "cve": "CVE-2023-23914", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \"links\" in this \"decompression chain\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24329", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25136", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-25136" }, { "cve": "CVE-2023-25139", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-25139" }, { "cve": "CVE-2023-26604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27371", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more \u0027\\0\u0027 bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27371" }, { "cve": "CVE-2023-27533", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \"telnet options\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application\u0027s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse. libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27538" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-28531", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-28531" }, { "cve": "CVE-2023-29383", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-29491", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29491" }, { "cve": "CVE-2023-29499", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29499" }, { "cve": "CVE-2023-31085", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-31085" }, { "cve": "CVE-2023-32611", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32611" }, { "cve": "CVE-2023-32636", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32636" }, { "cve": "CVE-2023-32643", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32643" }, { "cve": "CVE-2023-32665", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32665" }, { "cve": "CVE-2023-34319", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The fix for XSA-423 added logic to Linux\u0027es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn\u0027t account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that\u0027s specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-34319" }, { "cve": "CVE-2023-34969", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35945", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy\u2019s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-35945" }, { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38408" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "summary", "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-39128", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39128" }, { "cve": "CVE-2023-39189", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39189" }, { "cve": "CVE-2023-39192", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-39194", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39194" }, { "cve": "CVE-2023-39615", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor\u0027s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39615" }, { "cve": "CVE-2023-40283", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-40283" }, { "cve": "CVE-2023-42754", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42755", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-42755" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45322", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor\u0027s position is \"I don\u0027t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can\u0027t control when memory allocations fail.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45322" }, { "cve": "CVE-2023-45853", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45853" }, { "cve": "CVE-2023-45871", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45871" }, { "cve": "CVE-2023-45898", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45898" }, { "cve": "CVE-2023-45918", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45918" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-46862", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46862" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-0584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-0584" }, { "cve": "CVE-2024-2004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2004" }, { "cve": "CVE-2024-2379", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2379" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-2466", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "notes": [ { "category": "summary", "text": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2466" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions\r\nImpact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-28085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28085" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28757", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28757" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "notes": [ { "category": "summary", "text": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28835" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow. This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference. This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients. The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34459", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-34459" } ] }
ssa-398330
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nThese GNU/Linux vulnerabilities have been externally identified. Siemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.\n\nNote: This SSA advises vulnerabilities for firmware version V3.1 only; for versions \u003c V3.1 refer to Siemens Security Bulletin SSB-439005 (\nhttps://cert-portal.siemens.com/productcert/html/ssb-439005.html).", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-398330.json" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-398330.pdf" }, { "category": "self", "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-398330.txt" } ], "title": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1", "tracking": { "current_release_date": "2024-06-11T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-398330", "initial_release_date": "2023-12-12T00:00:00Z", "revision_history": [ { "date": "2023-12-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2021-44879, CVE-2023-46218, CVE-2023-46219, and CVE-2023-48795" }, { "date": "2024-02-13T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-45898, CVE-2023-46862, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2024-0584" }, { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added CVE-2023-52425, CVE-2023-52426, CVE-2023-45918" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added CVE-2024-28757" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.5", "number": "6", "summary": "Added CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-2511, CVE-2024-28085, CVE-2024-28182, CVE-2024-28834, CVE-2024-28835" }, { "date": "2024-06-11T00:00:00Z", "legacy_version": "1.6", "number": "7", "summary": "Added CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34459" } ], "status": "interim", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)", "product_id": "2", "product_identification_helper": { "model_numbers": [ "6ES7518-4AX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)", "product_id": "3", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AB0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)", "product_id": "4", "product_identification_helper": { "model_numbers": [ "6ES7518-4FX00-1AC0" ] } } } ], "category": "product_name", "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=V3.1.0", "product": { "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)", "product_id": "5", "product_identification_helper": { "model_numbers": [ "6AG1518-4AX00-4AC0" ] } } } ], "category": "product_name", "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0340", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2013-0340" }, { "cve": "CVE-2013-4235", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "summary", "text": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2013-4235" }, { "cve": "CVE-2014-7209", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2014-7209" }, { "cve": "CVE-2015-20107", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2015-20107" }, { "cve": "CVE-2016-3189", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-3189" }, { "cve": "CVE-2016-3709", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-3709" }, { "cve": "CVE-2016-4658", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-4658" }, { "cve": "CVE-2016-5131", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-5131" }, { "cve": "CVE-2016-9318", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-9318" }, { "cve": "CVE-2016-10228", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-10228" }, { "cve": "CVE-2016-10739", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2016-10739" }, { "cve": "CVE-2017-0663", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-0663" }, { "cve": "CVE-2017-7375", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-7375" }, { "cve": "CVE-2017-7376", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-7376" }, { "cve": "CVE-2017-9047", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9047" }, { "cve": "CVE-2017-9048", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9048" }, { "cve": "CVE-2017-9049", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9049" }, { "cve": "CVE-2017-9050", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-9050" }, { "cve": "CVE-2017-16931", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a \u0027%\u0027 character in a DTD name.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-16931" }, { "cve": "CVE-2017-16932", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-16932" }, { "cve": "CVE-2017-17512", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-17512" }, { "cve": "CVE-2017-18258", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2017-18258" }, { "cve": "CVE-2018-0495", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-0495" }, { "cve": "CVE-2018-12886", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-12886" }, { "cve": "CVE-2018-14404", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14567", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-14567" }, { "cve": "CVE-2018-18928", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-18928" }, { "cve": "CVE-2018-19591", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-19591" }, { "cve": "CVE-2018-20482", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user\u0027s process (e.g., a system backup running as root).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-20482" }, { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-20843" }, { "cve": "CVE-2018-25032", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2018-25032" }, { "cve": "CVE-2019-3855", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3855" }, { "cve": "CVE-2019-3856", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3856" }, { "cve": "CVE-2019-3857", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3857" }, { "cve": "CVE-2019-3858", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3858" }, { "cve": "CVE-2019-3859", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3859" }, { "cve": "CVE-2019-3860", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3860" }, { "cve": "CVE-2019-3861", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3861" }, { "cve": "CVE-2019-3862", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3862" }, { "cve": "CVE-2019-3863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-3863" }, { "cve": "CVE-2019-5018", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5018" }, { "cve": "CVE-2019-5094", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5094" }, { "cve": "CVE-2019-5188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5188" }, { "cve": "CVE-2019-5435", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in curl\u0027s URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5435" }, { "cve": "CVE-2019-5436", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5436" }, { "cve": "CVE-2019-5443", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl \u003c= 7.65.1 automatically run the code (as an openssl \"engine\") on invocation. If that curl is invoked by a privileged user it can do anything it wants.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5443" }, { "cve": "CVE-2019-5481", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5481" }, { "cve": "CVE-2019-5482", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-5482" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-6488", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-6488" }, { "cve": "CVE-2019-7309", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-7309" }, { "cve": "CVE-2019-8457", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-8457" }, { "cve": "CVE-2019-9169", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9169" }, { "cve": "CVE-2019-9636", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9636" }, { "cve": "CVE-2019-9674", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9674" }, { "cve": "CVE-2019-9740", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9740" }, { "cve": "CVE-2019-9923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9923" }, { "cve": "CVE-2019-9936", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9936" }, { "cve": "CVE-2019-9937", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9937" }, { "cve": "CVE-2019-9947", "cwe": { "id": "CWE-93", "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9947" }, { "cve": "CVE-2019-9948", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-9948" }, { "cve": "CVE-2019-10160", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "summary", "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-10160" }, { "cve": "CVE-2019-11360", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-11360" }, { "cve": "CVE-2019-12290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-12290" }, { "cve": "CVE-2019-12900", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-12900" }, { "cve": "CVE-2019-12904", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor\u0027s position is that the issue report cannot be validated because there is no description of an attack", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-12904" }, { "cve": "CVE-2019-13057", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-13057" }, { "cve": "CVE-2019-13565", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-13565" }, { "cve": "CVE-2019-13627", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-13627" }, { "cve": "CVE-2019-15847", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "notes": [ { "category": "summary", "text": "The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-15847" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-15903" }, { "cve": "CVE-2019-16056", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-16056" }, { "cve": "CVE-2019-16168", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-16168" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-16905" }, { "cve": "CVE-2019-17498", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17498" }, { "cve": "CVE-2019-17543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17543" }, { "cve": "CVE-2019-17594", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17594" }, { "cve": "CVE-2019-17595", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-17595" }, { "cve": "CVE-2019-18224", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-18224" }, { "cve": "CVE-2019-18276", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "summary", "text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-18276" }, { "cve": "CVE-2019-18348", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-18348" }, { "cve": "CVE-2019-19126", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19126" }, { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19906", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19906" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2019-19956", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19956" }, { "cve": "CVE-2019-19959", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \u0027\\0\u0027 characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-19959" }, { "cve": "CVE-2019-20218", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20218" }, { "cve": "CVE-2019-20367", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20367" }, { "cve": "CVE-2019-20388", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20388" }, { "cve": "CVE-2019-20795", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20795" }, { "cve": "CVE-2019-20907", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-20907" }, { "cve": "CVE-2019-25013", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-25013" }, { "cve": "CVE-2019-1010022", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010022" }, { "cve": "CVE-2019-1010023", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010023" }, { "cve": "CVE-2019-1010024", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010024" }, { "cve": "CVE-2019-1010025", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor\u0027s position is \"ASLR bypass itself is not a vulnerability.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010025" }, { "cve": "CVE-2019-1010180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2019-1010180" }, { "cve": "CVE-2020-1712", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-1712" }, { "cve": "CVE-2020-1751", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-1752" }, { "cve": "CVE-2020-6096", "cwe": { "id": "CWE-195", "name": "Signed to Unsigned Conversion Error" }, "notes": [ { "category": "summary", "text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-6096" }, { "cve": "CVE-2020-7595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-7595" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8315", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker\u0027s copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system\u0027s copy. Windows 8 and later are unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8315" }, { "cve": "CVE-2020-8492", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-8492" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-10029", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10029" }, { "cve": "CVE-2020-10531", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10531" }, { "cve": "CVE-2020-10543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10543" }, { "cve": "CVE-2020-10735", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10878", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-10878" }, { "cve": "CVE-2020-11501", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 \u0027\\0\u0027 bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-11501" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-12062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12062" }, { "cve": "CVE-2020-12243", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12243" }, { "cve": "CVE-2020-12723", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12723" }, { "cve": "CVE-2020-12762", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-12762" }, { "cve": "CVE-2020-13434", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13434" }, { "cve": "CVE-2020-13435", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13435" }, { "cve": "CVE-2020-13529", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13529" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13776", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13776" }, { "cve": "CVE-2020-13777", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13777" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-14145", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-14145" }, { "cve": "CVE-2020-14422", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-14422" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-15523", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "summary", "text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15523" }, { "cve": "CVE-2020-15778", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15778" }, { "cve": "CVE-2020-15801", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-15801" }, { "cve": "CVE-2020-19185", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19185" }, { "cve": "CVE-2020-19186", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19186" }, { "cve": "CVE-2020-19187", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19187" }, { "cve": "CVE-2020-19188", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19188" }, { "cve": "CVE-2020-19189", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19189" }, { "cve": "CVE-2020-19190", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19190" }, { "cve": "CVE-2020-19909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-19909" }, { "cve": "CVE-2020-21047", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-21047" }, { "cve": "CVE-2020-21913", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-21913" }, { "cve": "CVE-2020-22218", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-22218" }, { "cve": "CVE-2020-24659", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-24659" }, { "cve": "CVE-2020-24977", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-24977" }, { "cve": "CVE-2020-25692", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-25692" }, { "cve": "CVE-2020-25709", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-25709" }, { "cve": "CVE-2020-25710", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-25710" }, { "cve": "CVE-2020-26116", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-26116" }, { "cve": "CVE-2020-27618", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-27618" }, { "cve": "CVE-2020-28196", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-28196" }, { "cve": "CVE-2020-29361", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29361" }, { "cve": "CVE-2020-29362", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29362" }, { "cve": "CVE-2020-29363", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29363" }, { "cve": "CVE-2020-29562", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29562" }, { "cve": "CVE-2020-29573", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-29573" }, { "cve": "CVE-2020-35525", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-35525" }, { "cve": "CVE-2020-35527", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-35527" }, { "cve": "CVE-2020-36221", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36221" }, { "cve": "CVE-2020-36222", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36222" }, { "cve": "CVE-2020-36223", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36223" }, { "cve": "CVE-2020-36224", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36224" }, { "cve": "CVE-2020-36225", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36225" }, { "cve": "CVE-2020-36226", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36226" }, { "cve": "CVE-2020-36227", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36227" }, { "cve": "CVE-2020-36228", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36228" }, { "cve": "CVE-2020-36229", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36229" }, { "cve": "CVE-2020-36230", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2020-36230" }, { "cve": "CVE-2021-3177", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3177" }, { "cve": "CVE-2021-3326", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3326" }, { "cve": "CVE-2021-3426", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3426" }, { "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3516" }, { "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3517" }, { "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3520", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3541", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3541" }, { "cve": "CVE-2021-3580", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3580" }, { "cve": "CVE-2021-3733", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3826", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3997", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3997" }, { "cve": "CVE-2021-3998", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3998" }, { "cve": "CVE-2021-3999", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4122", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-4122" }, { "cve": "CVE-2021-4189", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-4189" }, { "cve": "CVE-2021-4209", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in GnuTLS. As Nettle\u0027s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-4209" }, { "cve": "CVE-2021-20193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20193" }, { "cve": "CVE-2021-20227", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in SQLite\u0027s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20227" }, { "cve": "CVE-2021-20231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20231" }, { "cve": "CVE-2021-20232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20232" }, { "cve": "CVE-2021-20305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-20305" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "**NOTE: CVE-2021-22898 is an incomplete fix (see https://hackerone.com/reports/1223882)! Check if affected products also have fixed CVE-22925 instead! Do not use CVE-2021-22898 in public advisories!**\r\n\r\ncurl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl. This rarely used option is used to send variable=content pairs to TELNET servers. Due to flaw in the option parser for sending `NEW_ENV` variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol. This could happen because curl did not call and use sscanf() correctly when parsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23336", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-23336" }, { "cve": "CVE-2021-27212", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27212" }, { "cve": "CVE-2021-27218", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27218" }, { "cve": "CVE-2021-27219", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27219" }, { "cve": "CVE-2021-27645", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-27645" }, { "cve": "CVE-2021-28041", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28041" }, { "cve": "CVE-2021-28153", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28363", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn\u0027t given via proxy_config) doesn\u0027t verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28363" }, { "cve": "CVE-2021-28861", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "summary", "text": "Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-28861" }, { "cve": "CVE-2021-31239", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue found in SQLite SQLite3 v.3.35.4 that could allow a remote attacker to cause a denial of service via the appendvfs.c function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-31239" }, { "cve": "CVE-2021-32292", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-32292" }, { "cve": "CVE-2021-33294", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33294" }, { "cve": "CVE-2021-33560", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33560" }, { "cve": "CVE-2021-33574", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33574" }, { "cve": "CVE-2021-33910", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-33910" }, { "cve": "CVE-2021-35942", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-35942" }, { "cve": "CVE-2021-36084", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36084" }, { "cve": "CVE-2021-36085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36085" }, { "cve": "CVE-2021-36086", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36086" }, { "cve": "CVE-2021-36087", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36087" }, { "cve": "CVE-2021-36222", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-36690", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-36690" }, { "cve": "CVE-2021-37600", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-37600" }, { "cve": "CVE-2021-37750", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-37750" }, { "cve": "CVE-2021-38604", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-38604" }, { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-41617" }, { "cve": "CVE-2021-43396", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious \u0027\\0\u0027 character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states \"the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there\u0027s no security impact to the bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-43396" }, { "cve": "CVE-2021-43618", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-43618" }, { "cve": "CVE-2021-44879", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45960", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46143" }, { "cve": "CVE-2021-46195", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0391", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like \u0027\\r\u0027 and \u0027\\n\u0027 in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0563", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "summary", "text": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-0563" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1271", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1304", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1304" }, { "cve": "CVE-2022-1343", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1343" }, { "cve": "CVE-2022-1434", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1434" }, { "cve": "CVE-2022-1473", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-1473" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2274", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2274" }, { "cve": "CVE-2022-2509", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-2509" }, { "cve": "CVE-2022-3715", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-3715" }, { "cve": "CVE-2022-3821", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-3821" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-22576", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22576" }, { "cve": "CVE-2022-22822", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23852", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23990", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26488", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-26488" }, { "cve": "CVE-2022-27774", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl\u0027s \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "summary", "text": "The curl URL parser wrongly accepts percent-encoded URL separators like \u0027/\u0027when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server\u0027s certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-27943" }, { "cve": "CVE-2022-28321", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn\u0027t correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-28321" }, { "cve": "CVE-2022-29155", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-29155" }, { "cve": "CVE-2022-29824", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-29824" }, { "cve": "CVE-2022-30115", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-30115" }, { "cve": "CVE-2022-32205", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-32221" }, { "cve": "CVE-2022-35252", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "summary", "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "summary", "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-35737" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-40674" }, { "cve": "CVE-2022-42898", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42915", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in curl \u003c7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop U+002E (.). Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-43680" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45873", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-45873" }, { "cve": "CVE-2022-46908", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-46908" }, { "cve": "CVE-2022-48303", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48522", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-48522" }, { "cve": "CVE-2022-48560", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2022-48560" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0361", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0687", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It\u0027s basically trusted input or input that needs an actual security flaw to be compromised or controlled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-0687" }, { "cve": "CVE-2023-1077", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1206", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-1206" }, { "cve": "CVE-2023-2650", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(square(n)) with \u0027n\u0027 being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer\u0027s certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-2650" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3212", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3212" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3609", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3609" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3772", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3772" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4016", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4016" }, { "cve": "CVE-2023-4039", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "summary", "text": "A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4039" }, { "cve": "CVE-2023-4527", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4527" }, { "cve": "CVE-2023-4623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-4806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4806" }, { "cve": "CVE-2023-4807", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4813", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4813" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-4921", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-5156", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5156" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5717", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5717" }, { "cve": "CVE-2023-5981", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-5981" }, { "cve": "CVE-2023-6121", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6121" }, { "cve": "CVE-2023-6817", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6817" }, { "cve": "CVE-2023-6931", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-6932" }, { "cve": "CVE-2023-23914", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \"links\" in this \"decompression chain\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24329", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25136", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-25136" }, { "cve": "CVE-2023-25139", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-25139" }, { "cve": "CVE-2023-26604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27371", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more \u0027\\0\u0027 bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27371" }, { "cve": "CVE-2023-27533", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \"telnet options\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application\u0027s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse. libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-27538" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-28531", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-28531" }, { "cve": "CVE-2023-29383", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-29491", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29491" }, { "cve": "CVE-2023-29499", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-29499" }, { "cve": "CVE-2023-31085", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-31085" }, { "cve": "CVE-2023-32611", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32611" }, { "cve": "CVE-2023-32636", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32636" }, { "cve": "CVE-2023-32643", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32643" }, { "cve": "CVE-2023-32665", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-32665" }, { "cve": "CVE-2023-34319", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The fix for XSA-423 added logic to Linux\u0027es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn\u0027t account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that\u0027s specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-34319" }, { "cve": "CVE-2023-34969", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35945", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy\u2019s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-35945" }, { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38408" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "summary", "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-39128", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39128" }, { "cve": "CVE-2023-39189", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39189" }, { "cve": "CVE-2023-39192", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-39194", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39194" }, { "cve": "CVE-2023-39615", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor\u0027s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-39615" }, { "cve": "CVE-2023-40283", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-40283" }, { "cve": "CVE-2023-42754", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42755", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-42755" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45322", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor\u0027s position is \"I don\u0027t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can\u0027t control when memory allocations fail.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45322" }, { "cve": "CVE-2023-45853", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45853" }, { "cve": "CVE-2023-45871", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45871" }, { "cve": "CVE-2023-45898", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45898" }, { "cve": "CVE-2023-45918", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-45918" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-46862", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-46862" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "summary", "text": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-0584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-0584" }, { "cve": "CVE-2024-2004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2004" }, { "cve": "CVE-2024-2379", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2379" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-2466", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "notes": [ { "category": "summary", "text": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2466" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions\r\nImpact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-28085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28085" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28757", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28757" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "notes": [ { "category": "summary", "text": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-28835" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "nscd: Stack-based buffer overflow in netgroup cache\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) fixed size cache is exhausted\r\nby client requests then a subsequent client request for netgroup data\r\nmay result in a stack-based buffer overflow. This flaw was introduced\r\nin glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "nscd: Null pointer crashes after notfound response\r\n\r\nIf the Name Service Cache Daemon\u0027s (nscd) cache fails to add a not-found\r\nnetgroup response to the cache, the client request can result in a null\r\npointer dereference. This flaw was introduced in glibc 2.15 when the\r\ncache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache may terminate daemon on memory allocation failure\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache uses xmalloc or\r\nxrealloc and these functions may terminate the process due to a memory\r\nallocation failure resulting in a denial of service to the clients. The\r\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "summary", "text": "nscd: netgroup cache assumes NSS callback uses in-buffer strings\r\n\r\nThe Name Service Cache Daemon\u0027s (nscd) netgroup cache can corrupt memory\r\nwhen the NSS callback does not store all strings in the provided buffer.\r\nThe flaw was introduced in glibc 2.15 when the cache was added to nscd.\r\n\r\nThis vulnerability is only present in the nscd binary.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34459", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5" ] }, "remediations": [ { "category": "mitigation", "details": "Only build and run applications from trusted sources.", "product_ids": [ "1", "2", "3", "4", "5" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1", "2", "3", "4", "5" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "title": "CVE-2024-34459" } ] }
gsd-2022-0778
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-0778", "description": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).", "id": "GSD-2022-0778", "references": [ "https://www.debian.org/security/2022/dsa-5103", "https://advisories.mageia.org/CVE-2022-0778.html", "https://access.redhat.com/errata/RHSA-2022:1065", "https://access.redhat.com/errata/RHSA-2022:1066", "https://access.redhat.com/errata/RHSA-2022:1071", "https://access.redhat.com/errata/RHSA-2022:1073", "https://access.redhat.com/errata/RHSA-2022:1076", "https://access.redhat.com/errata/RHSA-2022:1077", "https://access.redhat.com/errata/RHSA-2022:1078", "https://access.redhat.com/errata/RHSA-2022:1082", "https://access.redhat.com/errata/RHSA-2022:1091", "https://access.redhat.com/errata/RHSA-2022:1112", "https://www.suse.com/security/cve/CVE-2022-0778.html", "https://ubuntu.com/security/CVE-2022-0778", "https://access.redhat.com/errata/RHSA-2022:1263", "https://access.redhat.com/errata/RHSA-2022:1389", "https://access.redhat.com/errata/RHSA-2022:1390", "https://access.redhat.com/errata/RHSA-2022:1476", "https://alas.aws.amazon.com/cve/html/CVE-2022-0778.html", "https://linux.oracle.com/cve/CVE-2022-0778.html", "https://access.redhat.com/errata/RHSA-2022:1519", "https://access.redhat.com/errata/RHSA-2022:1520", "https://access.redhat.com/errata/RHSA-2022:4896", "https://access.redhat.com/errata/RHSA-2022:4899", "https://access.redhat.com/errata/RHSA-2022:4956", "https://packetstormsecurity.com/files/cve/CVE-2022-0778", "https://access.redhat.com/errata/RHSA-2022:5326" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-0778" ], "details": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).", "id": "GSD-2022-0778", "modified": "2023-12-13T01:19:11.323334Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "DATE_PUBLIC": "2022-03-15", "ID": "CVE-2022-0778", "STATE": "PUBLIC", "TITLE": "Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_value": "Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1)" }, { "version_value": "Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m)" }, { "version_value": "Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc)" } ] } } ] }, "vendor_name": "OpenSSL" } ] } }, "credit": [ { "lang": "eng", "value": "Tavis Ormandy (Google)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc)." } ] }, "impact": [ { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#High", "value": "High" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Infinite loop" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20220315.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "name": "DSA-5103", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "name": "FEDORA-2022-a5f51502f0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "name": "FEDORA-2022-9e88b5d8d7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "name": "FEDORA-2022-8bb51f6901", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220321-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "name": "https://www.tenable.com/security/tns-2022-06", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2022-06" }, { "name": "https://www.tenable.com/security/tns-2022-07", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2022-07" }, { "name": "https://www.tenable.com/security/tns-2022-08", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2022-08" }, { "name": "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "name": "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "name": "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://support.apple.com/kb/HT213257", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213257" }, { "name": "https://support.apple.com/kb/HT213256", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213256" }, { "name": "https://support.apple.com/kb/HT213255", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213255" }, { "name": "https://www.tenable.com/security/tns-2022-09", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2022-09" }, { "name": "https://security.netapp.com/advisory/ntap-20220429-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "name": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "name": "GLSA-202210-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202210-02" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=1.0.2 \u003c1.0.2zd||\u003e=1.1.0 \u003c1.1.1n||\u003e=3.0.0 \u003c3.0.2", "affected_versions": "All versions starting from 1.0.2 before 1.0.2zd, all versions starting from 1.1.0 before 1.1.1n, all versions starting from 3.0.0 before 3.0.2", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-835", "CWE-937" ], "date": "2022-11-09", "description": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters", "fixed_versions": [ "1.0.2zd", "1.1.1n", "3.0.2" ], "identifier": "CVE-2022-0778", "identifiers": [ "CVE-2022-0778" ], "not_impacted": "All versions before 1.0.2, all versions starting from 1.0.2zd before 1.1.0, all versions starting from 1.1.1n before 3.0.0, all versions starting from 3.0.2", "package_slug": "conan/openssl", "pubdate": "2022-03-15", "solution": "Upgrade to versions 1.0.2zd, 1.1.1n, 3.0.2 or above.", "title": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "https://www.debian.org/security/2022/dsa-5103", "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html", "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html", "https://security.netapp.com/advisory/ntap-20220321-0002/" ], "uuid": "8351f036-2eee-487c-9ffb-72de8d0e0d73" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.0.2", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.2zd", "versionStartIncluding": "1.0.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1.1n", "versionStartIncluding": "1.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.2", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.15.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.3.33", "versionStartIncluding": "10.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.4.23", "versionStartIncluding": "10.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.5.14", "versionStartIncluding": "10.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.7.2", "versionStartIncluding": "10.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.6.6", "versionStartIncluding": "10.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.2.42", "versionStartIncluding": "10.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "12.12.0", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "17.7.2", "versionStartExcluding": "17.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "16.14.2", "versionStartIncluding": "16.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "14.19.1", "versionStartIncluding": "14.15.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "12.22.11", "versionStartIncluding": "12.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "16.12.0", "versionStartExcluding": "16.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "14.14.0", "versionStartExcluding": "14.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "ID": "CVE-2022-0778" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-835" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "name": "https://www.openssl.org/news/secadv/20220315.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246", "refsource": "CONFIRM", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65", "refsource": "CONFIRM", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" }, { "name": "DSA-5103", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5103" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "name": "[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220321-0002/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "name": "FEDORA-2022-a5f51502f0", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "name": "https://www.tenable.com/security/tns-2022-06", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-06" }, { "name": "https://www.tenable.com/security/tns-2022-07", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-07" }, { "name": "FEDORA-2022-9e88b5d8d7", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "name": "FEDORA-2022-8bb51f6901", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "name": "https://www.tenable.com/security/tns-2022-08", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-08" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://www.tenable.com/security/tns-2022-09", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-09" }, { "name": "https://security.netapp.com/advisory/ntap-20220429-0005/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "name": "https://support.apple.com/kb/HT213256", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213256" }, { "name": "https://support.apple.com/kb/HT213255", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213255" }, { "name": "https://support.apple.com/kb/HT213257", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213257" }, { "name": "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "name": "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "name": "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "name": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "GLSA-202210-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-11-09T20:43Z", "publishedDate": "2022-03-15T17:15Z" } } }
ncsc-2024-0333
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "SAP heeft kwetsbaarheden verholpen in diverse producten als SAP Business Objects, SAP HANA, Netweaver en Document Builder.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Server Side Request Forgery (SSRF)\n- Cross-Site Scripting (XSS)\n- Omzeilen van authenticatie\n- Omzeilen van beveiligingsmaatregel\n- Manipulatie van gegevens\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "SAP heeft updates uitgebracht om de kwetsbaarheden te verhelpen in de kwetsbare producten. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "general", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "XML Injection (aka Blind XPath Injection)", "title": "CWE-91" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/august-2024.html" } ], "title": "Kwetsbaarheden verholpen in SAP producten", "tracking": { "current_release_date": "2024-08-13T13:47:02.764070Z", "id": "NCSC-2024-0333", "initial_release_date": "2024-08-13T13:47:02.764070Z", "revision_history": [ { "date": "2024-08-13T13:47:02.764070Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614277", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-base-b_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614276", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-base-e_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614279", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-base-s_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614278", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-ibc_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614280", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:biwebapp_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1464457", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:430:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1464458", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:440:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1475737", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:enterprise_420:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1614275", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:enterprise_430:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_backoffice", "product": { "name": "sap_commerce_backoffice", "product_id": "CSAFPID-1614262", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_backoffice:hy_com_2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614269", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:1811:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614270", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:1905:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614271", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2005:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614273", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2011:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614272", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2105:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614274", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1548429", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:com_cloud_2211:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614268", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:hy_com_1808:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce", "product": { "name": "sap_commerce", "product_id": "CSAFPID-1495976", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce:com_cloud_2211:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce", "product": { "name": "sap_commerce", "product_id": "CSAFPID-1495975", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce:hy_com_2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614238", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:701:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614239", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614240", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:712:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614241", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:713:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614242", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:714:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614237", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:bbpcrm_700:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1475725", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_102:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614203", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_103:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614204", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_104:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614205", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_105:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614206", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_106:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614207", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_107:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614208", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_108:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1475732", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614209", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614210", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_746:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614211", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_747:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614212", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_748:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614255", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614256", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614260", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.54:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614257", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.77:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614258", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.85:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614259", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.89:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614261", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.93:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614243", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64nuc_7.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614244", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64nuc_7.22ext:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614245", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64uc_7.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614246", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64uc_7.22ext:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614247", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64uc_7.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614251", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.22_ext:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614248", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614253", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.54:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614249", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.77:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614250", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.85:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614252", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.89:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614254", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.93:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465636", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_700:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614223", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_701:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614224", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465639", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465640", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_740:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465641", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_750:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465642", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_751:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465643", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_752:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465644", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_753:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465645", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_754:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465646", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_755:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465647", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_756:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465648", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_757:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614225", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_758:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614226", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_912:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1559117", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:755:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1559118", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:756:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614230", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:757:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614231", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:758:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614232", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_700:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614233", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_701:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614234", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614235", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614236", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_912:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614229", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_ui_754:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_permit_to_work", "product": { "name": "sap_permit_to_work", "product_id": "CSAFPID-1614228", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_permit_to_work:900:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_permit_to_work", "product": { "name": "sap_permit_to_work", "product_id": "CSAFPID-1614227", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_permit_to_work:uis4hop1_800:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614264", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614265", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:746:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614266", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:747:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614267", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:748:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614263", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:sap_bs_fnd_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614213", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:617:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614214", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:618:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614215", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:802:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614216", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:803:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614217", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:804:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614218", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:805:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614219", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:806:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614220", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:807:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614221", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:808:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "sap_se" }, { "branches": [ { "category": "product_name", "name": "businessobjects_business_intelligence_platform", "product": { "name": "businessobjects_business_intelligence_platform", "product_id": "CSAFPID-55201", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:420:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "businessobjects_business_intelligence_platform", "product": { "name": "businessobjects_business_intelligence_platform", "product_id": "CSAFPID-55202", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:430:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "businessobjects_business_intelligence_platform", "product": { "name": "businessobjects_business_intelligence_platform", "product_id": "CSAFPID-955724", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:440:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "commerce_backoffice", "product": { "name": "commerce_backoffice", "product_id": "CSAFPID-1614815", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:commerce_backoffice:2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1611687", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_102:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614517", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_103:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614513", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_104:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614515", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_105:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614521", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_106:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614522", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_107:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614520", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_108:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1611685", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614518", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614519", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_746:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614516", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_747:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614514", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_748:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap", "product": { "name": "sap", "product_id": "CSAFPID-1498297", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:sap:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1614510", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:617:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475930", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:618:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475932", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:802:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475933", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:803:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475927", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:804:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475931", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:805:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475928", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:806:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475934", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:807:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475929", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:808:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "sap" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2022-0778", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0778.json" } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-0215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json" } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-0286", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json" } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-30533", "references": [ { "category": "self", "summary": "CVE-2023-30533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30533.json" } ], "title": "CVE-2023-30533" }, { "cve": "CVE-2024-28166", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "product_status": { "known_affected": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28166", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28166.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] } ], "title": "CVE-2024-28166" }, { "cve": "CVE-2024-29415", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "references": [ { "category": "self", "summary": "CVE-2024-29415", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29415.json" } ], "title": "CVE-2024-29415" }, { "cve": "CVE-2024-33003", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1614268", "CSAFPID-1614269", "CSAFPID-1614270", "CSAFPID-1614271", "CSAFPID-1614272", "CSAFPID-1614273", "CSAFPID-1614274", "CSAFPID-1548429", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33003", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33003.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614268", "CSAFPID-1614269", "CSAFPID-1614270", "CSAFPID-1614271", "CSAFPID-1614272", "CSAFPID-1614273", "CSAFPID-1614274", "CSAFPID-1548429", "CSAFPID-1498297" ] } ], "title": "CVE-2024-33003" }, { "cve": "CVE-2024-33005", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614243", "CSAFPID-1614244", "CSAFPID-1614245", "CSAFPID-1614246", "CSAFPID-1614247", "CSAFPID-1614248", "CSAFPID-1614249", "CSAFPID-1614250", "CSAFPID-1614251", "CSAFPID-1614252", "CSAFPID-1614253", "CSAFPID-1614254", "CSAFPID-1614255", "CSAFPID-1614256", "CSAFPID-1614257", "CSAFPID-1614258", "CSAFPID-1614259", "CSAFPID-1614260", "CSAFPID-1614261", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33005", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33005.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1614243", "CSAFPID-1614244", "CSAFPID-1614245", "CSAFPID-1614246", "CSAFPID-1614247", "CSAFPID-1614248", "CSAFPID-1614249", "CSAFPID-1614250", "CSAFPID-1614251", "CSAFPID-1614252", "CSAFPID-1614253", "CSAFPID-1614254", "CSAFPID-1614255", "CSAFPID-1614256", "CSAFPID-1614257", "CSAFPID-1614258", "CSAFPID-1614259", "CSAFPID-1614260", "CSAFPID-1614261", "CSAFPID-1498297" ] } ], "title": "CVE-2024-33005" }, { "cve": "CVE-2024-39591", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1475725", "CSAFPID-1614203", "CSAFPID-1614204", "CSAFPID-1614205", "CSAFPID-1614206", "CSAFPID-1614207", "CSAFPID-1614208", "CSAFPID-1475732", "CSAFPID-1614209", "CSAFPID-1614210", "CSAFPID-1614211", "CSAFPID-1614212", "CSAFPID-1611687", "CSAFPID-1611685", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39591", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39591.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1475725", "CSAFPID-1614203", "CSAFPID-1614204", "CSAFPID-1614205", "CSAFPID-1614206", "CSAFPID-1614207", "CSAFPID-1614208", "CSAFPID-1475732", "CSAFPID-1614209", "CSAFPID-1614210", "CSAFPID-1614211", "CSAFPID-1614212", "CSAFPID-1611687", "CSAFPID-1611685", "CSAFPID-1498297" ] } ], "title": "CVE-2024-39591" }, { "cve": "CVE-2024-41730", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614275", "CSAFPID-1464458", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41730", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41730.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1614275", "CSAFPID-1464458", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41730" }, { "cve": "CVE-2024-41731", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "product_status": { "known_affected": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41731", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41731.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41731" }, { "cve": "CVE-2024-41732", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1614229", "CSAFPID-1559117", "CSAFPID-1559118", "CSAFPID-1614230", "CSAFPID-1614231", "CSAFPID-1614232", "CSAFPID-1614233", "CSAFPID-1614234", "CSAFPID-1614235", "CSAFPID-1614236", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41732", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41732.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614229", "CSAFPID-1559117", "CSAFPID-1559118", "CSAFPID-1614230", "CSAFPID-1614231", "CSAFPID-1614232", "CSAFPID-1614233", "CSAFPID-1614234", "CSAFPID-1614235", "CSAFPID-1614236", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41732" }, { "cve": "CVE-2024-41733", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1495975", "CSAFPID-1495976", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41733", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41733.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1495975", "CSAFPID-1495976", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41733" }, { "cve": "CVE-2024-41734", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1465636", "CSAFPID-1614223", "CSAFPID-1614224", "CSAFPID-1465639", "CSAFPID-1465640", "CSAFPID-1465641", "CSAFPID-1465642", "CSAFPID-1465643", "CSAFPID-1465644", "CSAFPID-1465645", "CSAFPID-1465646", "CSAFPID-1465647", "CSAFPID-1465648", "CSAFPID-1614225", "CSAFPID-1614226", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41734", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41734.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1465636", "CSAFPID-1614223", "CSAFPID-1614224", "CSAFPID-1465639", "CSAFPID-1465640", "CSAFPID-1465641", "CSAFPID-1465642", "CSAFPID-1465643", "CSAFPID-1465644", "CSAFPID-1465645", "CSAFPID-1465646", "CSAFPID-1465647", "CSAFPID-1465648", "CSAFPID-1614225", "CSAFPID-1614226", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41734" }, { "cve": "CVE-2024-41735", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1614262", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41735", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41735.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614262", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41735" }, { "cve": "CVE-2024-41736", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1614227", "CSAFPID-1614228", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41736.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614227", "CSAFPID-1614228", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41736" }, { "cve": "CVE-2024-41737", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1614237", "CSAFPID-1614238", "CSAFPID-1614239", "CSAFPID-1614240", "CSAFPID-1614241", "CSAFPID-1614242", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41737", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41737.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614237", "CSAFPID-1614238", "CSAFPID-1614239", "CSAFPID-1614240", "CSAFPID-1614241", "CSAFPID-1614242", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41737" }, { "cve": "CVE-2024-42373", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614213", "CSAFPID-1614214", "CSAFPID-1614215", "CSAFPID-1614216", "CSAFPID-1614217", "CSAFPID-1614218", "CSAFPID-1614219", "CSAFPID-1614220", "CSAFPID-1614221", "CSAFPID-1475927", "CSAFPID-1475928", "CSAFPID-1475929", "CSAFPID-1475930", "CSAFPID-1475931", "CSAFPID-1475932", "CSAFPID-1475933", "CSAFPID-1475934", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42373", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42373.json" } ], "title": "CVE-2024-42373" }, { "cve": "CVE-2024-42374", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "notes": [ { "category": "other", "text": "XML Injection (aka Blind XPath Injection)", "title": "CWE-91" } ], "product_status": { "known_affected": [ "CSAFPID-1614276", "CSAFPID-1614277", "CSAFPID-1614278", "CSAFPID-1614279", "CSAFPID-1614280", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42374", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42374.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1614276", "CSAFPID-1614277", "CSAFPID-1614278", "CSAFPID-1614279", "CSAFPID-1614280", "CSAFPID-1498297" ] } ], "title": "CVE-2024-42374" }, { "cve": "CVE-2024-42375", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "product_status": { "known_affected": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42375", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42375.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] } ], "title": "CVE-2024-42375" }, { "cve": "CVE-2024-42376", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614263", "CSAFPID-1614264", "CSAFPID-1614265", "CSAFPID-1614266", "CSAFPID-1614267", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42376", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42376.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614263", "CSAFPID-1614264", "CSAFPID-1614265", "CSAFPID-1614266", "CSAFPID-1614267", "CSAFPID-1498297" ] } ], "title": "CVE-2024-42376" } ] }
NCSC-2024-0239
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Solarwinds heeft kwetsbaarheden verholpen in Solarwinds Platform.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, een command-injection uit te voeren, of om een Cross-Site-Scripting-aanval uit te voeren. Een dergelijke aanval kan leiden tot uitvoer van willekeurige code in de browser van het slachtoffer.\n\nVoor succesvol misbruik moet de kwaadwillende voorafgaande authenticatie hebben.", "title": "Interpretaties" }, { "category": "description", "text": "Solarwinds heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Solarwinds Platform 2024.2\n\nIn deze updates zijn tevens kwetsbaarheden verholpen in onderliggende third-party software waar het platform gebruik van maakt. Voor deze kwetsbaarheden zijn eerdere beveiligingsadviezen gepubliceerd.\n\nZie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Incorrect Calculation", "title": "CWE-682" }, { "category": "general", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28996" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28999" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29004" } ], "title": "Kwetsbaarheden verholpen in Solarwinds Platform", "tracking": { "current_release_date": "2024-06-07T06:26:01.172456Z", "id": "NCSC-2024-0239", "initial_release_date": "2024-06-07T06:26:01.172456Z", "revision_history": [ { "date": "2024-06-07T06:26:01.172456Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "solarwinds_platform_", "product": { "name": "solarwinds_platform_", "product_id": "CSAFPID-1463738", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds_:solarwinds_platform_:2024.1.1_and_previous_versions:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "solarwinds_platform", "product": { "name": "solarwinds_platform", "product_id": "CSAFPID-1463740", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds_:solarwinds_platform:2024.1.1_and_previous_versions_:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "solarwinds_" }, { "branches": [ { "category": "product_name", "name": "orion_platform", "product": { "name": "orion_platform", "product_id": "CSAFPID-1463455", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds:orion_platform:2024.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "orion_platform", "product": { "name": "orion_platform", "product_id": "CSAFPID-1463456", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds:orion_platform:2024.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "solarwinds_platform_", "product": { "name": "solarwinds_platform_", "product_id": "CSAFPID-1463739", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds:solarwinds_platform_:2024.1.1_and_previous_versions_:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "solarwinds" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "other", "text": "Incorrect Calculation", "title": "CWE-682" } ], "references": [ { "category": "self", "summary": "CVE-2017-3736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-3736.json" } ], "title": "CVE-2017-3736" }, { "cve": "CVE-2018-0732", "cwe": { "id": "CWE-325", "name": "Missing Cryptographic Step" }, "notes": [ { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2018-0732", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2018/CVE-2018-0732.json" } ], "title": "CVE-2018-0732" }, { "cve": "CVE-2018-0737", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "notes": [ { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "references": [ { "category": "self", "summary": "CVE-2018-0737", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2018/CVE-2018-0737.json" } ], "title": "CVE-2018-0737" }, { "cve": "CVE-2019-1559", "cwe": { "id": "CWE-325", "name": "Missing Cryptographic Step" }, "notes": [ { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2019-1559", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-1559.json" } ], "title": "CVE-2019-1559" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2020-1971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1971.json" } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2021-3712", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3712.json" } ], "title": "CVE-2021-3712" }, { "cve": "CVE-2021-4321", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "references": [ { "category": "self", "summary": "CVE-2021-4321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4321.json" } ], "title": "CVE-2021-4321" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2021-23840", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23840.json" } ], "title": "CVE-2021-23840" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2022-0778", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0778.json" } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-0215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json" } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-0286", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json" } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2024-28996", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" } ], "product_status": { "known_affected": [ "CSAFPID-1463739" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28996", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28996.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1463739" ] } ], "title": "CVE-2024-28996" }, { "cve": "CVE-2024-28999", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1463740" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1463740" ] } ], "title": "CVE-2024-28999" }, { "cve": "CVE-2024-29004", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1463738" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29004", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29004.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1463738" ] } ], "title": "CVE-2024-29004" } ] }
NCSC-2024-0333
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "SAP heeft kwetsbaarheden verholpen in diverse producten als SAP Business Objects, SAP HANA, Netweaver en Document Builder.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Server Side Request Forgery (SSRF)\n- Cross-Site Scripting (XSS)\n- Omzeilen van authenticatie\n- Omzeilen van beveiligingsmaatregel\n- Manipulatie van gegevens\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "SAP heeft updates uitgebracht om de kwetsbaarheden te verhelpen in de kwetsbare producten. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "general", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "XML Injection (aka Blind XPath Injection)", "title": "CWE-91" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/august-2024.html" } ], "title": "Kwetsbaarheden verholpen in SAP producten", "tracking": { "current_release_date": "2024-08-13T13:47:02.764070Z", "id": "NCSC-2024-0333", "initial_release_date": "2024-08-13T13:47:02.764070Z", "revision_history": [ { "date": "2024-08-13T13:47:02.764070Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614277", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-base-b_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614276", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-base-e_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614279", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-base-s_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614278", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:bi-ibc_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_bex_web_java_runtime_export_web_service", "product": { "name": "sap_bex_web_java_runtime_export_web_service", "product_id": "CSAFPID-1614280", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_bex_web_java_runtime_export_web_service:biwebapp_7.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1464457", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:430:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1464458", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:440:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1475737", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:enterprise_420:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_businessobjects_business_intelligence_platform", "product": { "name": "sap_businessobjects_business_intelligence_platform", "product_id": "CSAFPID-1614275", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_businessobjects_business_intelligence_platform:enterprise_430:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_backoffice", "product": { "name": "sap_commerce_backoffice", "product_id": "CSAFPID-1614262", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_backoffice:hy_com_2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614269", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:1811:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614270", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:1905:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614271", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2005:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614273", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2011:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614272", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2105:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614274", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1548429", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:com_cloud_2211:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce_cloud", "product": { "name": "sap_commerce_cloud", "product_id": "CSAFPID-1614268", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce_cloud:hy_com_1808:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce", "product": { "name": "sap_commerce", "product_id": "CSAFPID-1495976", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce:com_cloud_2211:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_commerce", "product": { "name": "sap_commerce", "product_id": "CSAFPID-1495975", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_commerce:hy_com_2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614238", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:701:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614239", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614240", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:712:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614241", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:713:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614242", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:714:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_crm_abap__insights_management_", "product": { "name": "sap_crm_abap__insights_management_", "product_id": "CSAFPID-1614237", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_crm_abap__insights_management_:bbpcrm_700:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1475725", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_102:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614203", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_103:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614204", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_104:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614205", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_105:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614206", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_106:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614207", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_107:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614208", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:s4fnd_108:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1475732", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614209", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614210", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_746:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614211", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_747:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_document_builder", "product": { "name": "sap_document_builder", "product_id": "CSAFPID-1614212", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_document_builder:sap_bs_fnd_748:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614255", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614256", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614260", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.54:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614257", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.77:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614258", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.85:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614259", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.89:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614261", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:kernel_7.93:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614243", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64nuc_7.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614244", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64nuc_7.22ext:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614245", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64uc_7.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614246", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64uc_7.22ext:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614247", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:krnl64uc_7.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614251", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.22_ext:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614248", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614253", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.54:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614249", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.77:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614250", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.85:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614252", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.89:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product": { "name": "sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server", "product_id": "CSAFPID-1614254", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server__abap_and_java__sap_web_dispatcher_and_sap_content_server:webdisp_7.93:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465636", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_700:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614223", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_701:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614224", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465639", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465640", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_740:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465641", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_750:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465642", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_751:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465643", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_752:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465644", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_753:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465645", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_754:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465646", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_755:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465647", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_756:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1465648", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_757:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614225", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_758:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap_and_abap_platform", "product": { "name": "sap_netweaver_application_server_abap_and_abap_platform", "product_id": "CSAFPID-1614226", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap_and_abap_platform:sap_basis_912:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1559117", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:755:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1559118", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:756:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614230", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:757:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614231", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:758:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614232", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_700:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614233", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_701:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614234", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614235", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614236", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_basis_912:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_netweaver_application_server_abap", "product": { "name": "sap_netweaver_application_server_abap", "product_id": "CSAFPID-1614229", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_netweaver_application_server_abap:sap_ui_754:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_permit_to_work", "product": { "name": "sap_permit_to_work", "product_id": "CSAFPID-1614228", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_permit_to_work:900:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_permit_to_work", "product": { "name": "sap_permit_to_work", "product_id": "CSAFPID-1614227", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_permit_to_work:uis4hop1_800:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614264", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614265", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:746:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614266", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:747:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614267", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:748:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_shared_service_framework", "product": { "name": "sap_shared_service_framework", "product_id": "CSAFPID-1614263", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_shared_service_framework:sap_bs_fnd_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614213", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:617:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614214", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:618:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614215", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:802:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614216", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:803:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614217", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:804:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614218", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:805:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614219", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:806:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614220", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:807:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap_student_life_cycle_management__slcm_", "product": { "name": "sap_student_life_cycle_management__slcm_", "product_id": "CSAFPID-1614221", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_student_life_cycle_management__slcm_:808:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "sap_se" }, { "branches": [ { "category": "product_name", "name": "businessobjects_business_intelligence_platform", "product": { "name": "businessobjects_business_intelligence_platform", "product_id": "CSAFPID-55201", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:420:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "businessobjects_business_intelligence_platform", "product": { "name": "businessobjects_business_intelligence_platform", "product_id": "CSAFPID-55202", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:430:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "businessobjects_business_intelligence_platform", "product": { "name": "businessobjects_business_intelligence_platform", "product_id": "CSAFPID-955724", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:businessobjects_business_intelligence_platform:440:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "commerce_backoffice", "product": { "name": "commerce_backoffice", "product_id": "CSAFPID-1614815", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:commerce_backoffice:2205:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1611687", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_102:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614517", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_103:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614513", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_104:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614515", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_105:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614521", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_106:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614522", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_107:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614520", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:s4fnd_108:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1611685", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_702:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614518", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_731:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614519", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_746:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614516", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_747:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "document_builder", "product": { "name": "document_builder", "product_id": "CSAFPID-1614514", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:document_builder:sap_bs_fnd_748:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sap", "product": { "name": "sap", "product_id": "CSAFPID-1498297", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:sap:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1614510", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:617:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475930", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:618:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475932", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:802:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475933", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:803:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475927", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:804:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475931", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:805:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475928", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:806:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475934", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:807:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "student_life_cycle_management", "product": { "name": "student_life_cycle_management", "product_id": "CSAFPID-1475929", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:student_life_cycle_management:808:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "sap" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2022-0778", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0778.json" } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-0215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json" } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-0286", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json" } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-30533", "references": [ { "category": "self", "summary": "CVE-2023-30533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30533.json" } ], "title": "CVE-2023-30533" }, { "cve": "CVE-2024-28166", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "product_status": { "known_affected": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28166", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28166.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] } ], "title": "CVE-2024-28166" }, { "cve": "CVE-2024-29415", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "references": [ { "category": "self", "summary": "CVE-2024-29415", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29415.json" } ], "title": "CVE-2024-29415" }, { "cve": "CVE-2024-33003", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1614268", "CSAFPID-1614269", "CSAFPID-1614270", "CSAFPID-1614271", "CSAFPID-1614272", "CSAFPID-1614273", "CSAFPID-1614274", "CSAFPID-1548429", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33003", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33003.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614268", "CSAFPID-1614269", "CSAFPID-1614270", "CSAFPID-1614271", "CSAFPID-1614272", "CSAFPID-1614273", "CSAFPID-1614274", "CSAFPID-1548429", "CSAFPID-1498297" ] } ], "title": "CVE-2024-33003" }, { "cve": "CVE-2024-33005", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614243", "CSAFPID-1614244", "CSAFPID-1614245", "CSAFPID-1614246", "CSAFPID-1614247", "CSAFPID-1614248", "CSAFPID-1614249", "CSAFPID-1614250", "CSAFPID-1614251", "CSAFPID-1614252", "CSAFPID-1614253", "CSAFPID-1614254", "CSAFPID-1614255", "CSAFPID-1614256", "CSAFPID-1614257", "CSAFPID-1614258", "CSAFPID-1614259", "CSAFPID-1614260", "CSAFPID-1614261", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33005", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33005.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1614243", "CSAFPID-1614244", "CSAFPID-1614245", "CSAFPID-1614246", "CSAFPID-1614247", "CSAFPID-1614248", "CSAFPID-1614249", "CSAFPID-1614250", "CSAFPID-1614251", "CSAFPID-1614252", "CSAFPID-1614253", "CSAFPID-1614254", "CSAFPID-1614255", "CSAFPID-1614256", "CSAFPID-1614257", "CSAFPID-1614258", "CSAFPID-1614259", "CSAFPID-1614260", "CSAFPID-1614261", "CSAFPID-1498297" ] } ], "title": "CVE-2024-33005" }, { "cve": "CVE-2024-39591", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1475725", "CSAFPID-1614203", "CSAFPID-1614204", "CSAFPID-1614205", "CSAFPID-1614206", "CSAFPID-1614207", "CSAFPID-1614208", "CSAFPID-1475732", "CSAFPID-1614209", "CSAFPID-1614210", "CSAFPID-1614211", "CSAFPID-1614212", "CSAFPID-1611687", "CSAFPID-1611685", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39591", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39591.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1475725", "CSAFPID-1614203", "CSAFPID-1614204", "CSAFPID-1614205", "CSAFPID-1614206", "CSAFPID-1614207", "CSAFPID-1614208", "CSAFPID-1475732", "CSAFPID-1614209", "CSAFPID-1614210", "CSAFPID-1614211", "CSAFPID-1614212", "CSAFPID-1611687", "CSAFPID-1611685", "CSAFPID-1498297" ] } ], "title": "CVE-2024-39591" }, { "cve": "CVE-2024-41730", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614275", "CSAFPID-1464458", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41730", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41730.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1614275", "CSAFPID-1464458", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41730" }, { "cve": "CVE-2024-41731", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "product_status": { "known_affected": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41731", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41731.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41731" }, { "cve": "CVE-2024-41732", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1614229", "CSAFPID-1559117", "CSAFPID-1559118", "CSAFPID-1614230", "CSAFPID-1614231", "CSAFPID-1614232", "CSAFPID-1614233", "CSAFPID-1614234", "CSAFPID-1614235", "CSAFPID-1614236", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41732", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41732.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614229", "CSAFPID-1559117", "CSAFPID-1559118", "CSAFPID-1614230", "CSAFPID-1614231", "CSAFPID-1614232", "CSAFPID-1614233", "CSAFPID-1614234", "CSAFPID-1614235", "CSAFPID-1614236", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41732" }, { "cve": "CVE-2024-41733", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1495975", "CSAFPID-1495976", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41733", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41733.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1495975", "CSAFPID-1495976", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41733" }, { "cve": "CVE-2024-41734", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1465636", "CSAFPID-1614223", "CSAFPID-1614224", "CSAFPID-1465639", "CSAFPID-1465640", "CSAFPID-1465641", "CSAFPID-1465642", "CSAFPID-1465643", "CSAFPID-1465644", "CSAFPID-1465645", "CSAFPID-1465646", "CSAFPID-1465647", "CSAFPID-1465648", "CSAFPID-1614225", "CSAFPID-1614226", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41734", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41734.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1465636", "CSAFPID-1614223", "CSAFPID-1614224", "CSAFPID-1465639", "CSAFPID-1465640", "CSAFPID-1465641", "CSAFPID-1465642", "CSAFPID-1465643", "CSAFPID-1465644", "CSAFPID-1465645", "CSAFPID-1465646", "CSAFPID-1465647", "CSAFPID-1465648", "CSAFPID-1614225", "CSAFPID-1614226", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41734" }, { "cve": "CVE-2024-41735", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1614262", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41735", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41735.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614262", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41735" }, { "cve": "CVE-2024-41736", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1614227", "CSAFPID-1614228", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41736.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614227", "CSAFPID-1614228", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41736" }, { "cve": "CVE-2024-41737", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1614237", "CSAFPID-1614238", "CSAFPID-1614239", "CSAFPID-1614240", "CSAFPID-1614241", "CSAFPID-1614242", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41737", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41737.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614237", "CSAFPID-1614238", "CSAFPID-1614239", "CSAFPID-1614240", "CSAFPID-1614241", "CSAFPID-1614242", "CSAFPID-1498297" ] } ], "title": "CVE-2024-41737" }, { "cve": "CVE-2024-42373", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614213", "CSAFPID-1614214", "CSAFPID-1614215", "CSAFPID-1614216", "CSAFPID-1614217", "CSAFPID-1614218", "CSAFPID-1614219", "CSAFPID-1614220", "CSAFPID-1614221", "CSAFPID-1475927", "CSAFPID-1475928", "CSAFPID-1475929", "CSAFPID-1475930", "CSAFPID-1475931", "CSAFPID-1475932", "CSAFPID-1475933", "CSAFPID-1475934", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42373", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42373.json" } ], "title": "CVE-2024-42373" }, { "cve": "CVE-2024-42374", "cwe": { "id": "CWE-91", "name": "XML Injection (aka Blind XPath Injection)" }, "notes": [ { "category": "other", "text": "XML Injection (aka Blind XPath Injection)", "title": "CWE-91" } ], "product_status": { "known_affected": [ "CSAFPID-1614276", "CSAFPID-1614277", "CSAFPID-1614278", "CSAFPID-1614279", "CSAFPID-1614280", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42374", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42374.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1614276", "CSAFPID-1614277", "CSAFPID-1614278", "CSAFPID-1614279", "CSAFPID-1614280", "CSAFPID-1498297" ] } ], "title": "CVE-2024-42374" }, { "cve": "CVE-2024-42375", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "product_status": { "known_affected": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42375", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42375.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1475737", "CSAFPID-1464457", "CSAFPID-1464458", "CSAFPID-55201", "CSAFPID-55202", "CSAFPID-955724", "CSAFPID-1498297" ] } ], "title": "CVE-2024-42375" }, { "cve": "CVE-2024-42376", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1614263", "CSAFPID-1614264", "CSAFPID-1614265", "CSAFPID-1614266", "CSAFPID-1614267", "CSAFPID-1498297" ] }, "references": [ { "category": "self", "summary": "CVE-2024-42376", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42376.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1614263", "CSAFPID-1614264", "CSAFPID-1614265", "CSAFPID-1614266", "CSAFPID-1614267", "CSAFPID-1498297" ] } ], "title": "CVE-2024-42376" } ] }
ncsc-2024-0239
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Solarwinds heeft kwetsbaarheden verholpen in Solarwinds Platform.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, een command-injection uit te voeren, of om een Cross-Site-Scripting-aanval uit te voeren. Een dergelijke aanval kan leiden tot uitvoer van willekeurige code in de browser van het slachtoffer.\n\nVoor succesvol misbruik moet de kwaadwillende voorafgaande authenticatie hebben.", "title": "Interpretaties" }, { "category": "description", "text": "Solarwinds heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Solarwinds Platform 2024.2\n\nIn deze updates zijn tevens kwetsbaarheden verholpen in onderliggende third-party software waar het platform gebruik van maakt. Voor deze kwetsbaarheden zijn eerdere beveiligingsadviezen gepubliceerd.\n\nZie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Incorrect Calculation", "title": "CWE-682" }, { "category": "general", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28996" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28999" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29004" } ], "title": "Kwetsbaarheden verholpen in Solarwinds Platform", "tracking": { "current_release_date": "2024-06-07T06:26:01.172456Z", "id": "NCSC-2024-0239", "initial_release_date": "2024-06-07T06:26:01.172456Z", "revision_history": [ { "date": "2024-06-07T06:26:01.172456Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "solarwinds_platform_", "product": { "name": "solarwinds_platform_", "product_id": "CSAFPID-1463738", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds_:solarwinds_platform_:2024.1.1_and_previous_versions:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "solarwinds_platform", "product": { "name": "solarwinds_platform", "product_id": "CSAFPID-1463740", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds_:solarwinds_platform:2024.1.1_and_previous_versions_:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "solarwinds_" }, { "branches": [ { "category": "product_name", "name": "orion_platform", "product": { "name": "orion_platform", "product_id": "CSAFPID-1463455", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds:orion_platform:2024.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "orion_platform", "product": { "name": "orion_platform", "product_id": "CSAFPID-1463456", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds:orion_platform:2024.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "solarwinds_platform_", "product": { "name": "solarwinds_platform_", "product_id": "CSAFPID-1463739", "product_identification_helper": { "cpe": "cpe:2.3:a:solarwinds:solarwinds_platform_:2024.1.1_and_previous_versions_:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "solarwinds" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "other", "text": "Incorrect Calculation", "title": "CWE-682" } ], "references": [ { "category": "self", "summary": "CVE-2017-3736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-3736.json" } ], "title": "CVE-2017-3736" }, { "cve": "CVE-2018-0732", "cwe": { "id": "CWE-325", "name": "Missing Cryptographic Step" }, "notes": [ { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2018-0732", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2018/CVE-2018-0732.json" } ], "title": "CVE-2018-0732" }, { "cve": "CVE-2018-0737", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "notes": [ { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "references": [ { "category": "self", "summary": "CVE-2018-0737", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2018/CVE-2018-0737.json" } ], "title": "CVE-2018-0737" }, { "cve": "CVE-2019-1559", "cwe": { "id": "CWE-325", "name": "Missing Cryptographic Step" }, "notes": [ { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2019-1559", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-1559.json" } ], "title": "CVE-2019-1559" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2020-1971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1971.json" } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2021-3712", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3712.json" } ], "title": "CVE-2021-3712" }, { "cve": "CVE-2021-4321", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "references": [ { "category": "self", "summary": "CVE-2021-4321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4321.json" } ], "title": "CVE-2021-4321" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2021-23840", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23840.json" } ], "title": "CVE-2021-23840" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2022-0778", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0778.json" } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-0215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json" } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-0286", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json" } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2024-28996", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" } ], "product_status": { "known_affected": [ "CSAFPID-1463739" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28996", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28996.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1463739" ] } ], "title": "CVE-2024-28996" }, { "cve": "CVE-2024-28999", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1463740" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1463740" ] } ], "title": "CVE-2024-28999" }, { "cve": "CVE-2024-29004", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1463738" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29004", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29004.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1463738" ] } ], "title": "CVE-2024-29004" } ] }
ghsa-x3mh-jvjw-3xwx
Vulnerability from github
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "openssl-src" }, "ranges": [ { "events": [ { "introduced": "300.0.0" }, { "fixed": "300.0.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "crates.io", "name": "openssl-src" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "111.18.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-0778" ], "database_specific": { "cwe_ids": [ "CWE-835" ], "github_reviewed": true, "github_reviewed_at": "2022-05-03T20:40:34Z", "nvd_published_at": "2022-03-15T17:15:00Z", "severity": "HIGH" }, "details": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).", "id": "GHSA-x3mh-jvjw-3xwx", "modified": "2024-06-24T21:24:17Z", "published": "2022-03-16T00:00:45Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202210-02" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220321-0002" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220429-0005" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT213255" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT213256" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT213257" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2022-06" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2022-07" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2022-08" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2022-09" }, { "type": "WEB", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2022/May/38" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "openssl-src\u0027s infinite loop in `BN_mod_sqrt()` reachable when parsing certificates" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.